Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-49930 |
7.1 (3.1)
|
WordPress JetSearch plugin <= 3.5.10 - Cross Site Scri… |
CrocoBlock |
JetSearch |
2025-10-22T14:32:15.035Z | 2026-03-17T14:24:03.837Z |
| CVE-2025-49929 |
6.5 (3.1)
|
WordPress Ultimate Blocks plugin <= 3.3.6 - Cross Site… |
Ultimate Blocks |
Ultimate Blocks |
2025-10-22T14:32:14.811Z | 2026-03-17T14:23:13.520Z |
| CVE-2025-49928 |
6.5 (3.1)
|
WordPress JetWooBuilder plugin <= 2.1.20 - Cross Site … |
CrocoBlock |
JetWooBuilder |
2025-10-22T14:32:14.597Z | 2026-03-17T14:22:23.459Z |
| CVE-2025-49927 |
6.5 (3.1)
|
WordPress JetWooBuilder plugin <= 2.1.20.1 - Cross Sit… |
CrocoBlock |
JetWooBuilder |
2025-10-22T14:32:14.395Z | 2026-03-17T14:21:41.581Z |
| CVE-2025-49926 |
7.3 (3.1)
|
WordPress Kalium theme <= 3.25 - Arbitrary Code Execut… |
Laborator |
Kalium |
2025-10-22T14:32:14.208Z | 2026-03-17T14:20:34.013Z |
| CVE-2025-50505 |
7.8 (3.1)
|
Clash Verge Rev thru 2.2.3 (fixed in 2.3.0) force… |
n/a |
n/a |
2025-10-07T00:00:00.000Z | 2026-03-17T14:20:03.837Z |
| CVE-2025-9784 |
7.5 (3.1)
|
Undertow: undertow madeyoureset http/2 ddos vulnerability |
|
|
2025-09-02T13:37:59.772Z | 2026-03-17T14:18:53.652Z |
| CVE-2025-30415 |
7.5 (3.0)
|
Denial of service due to improper handling of mal… |
Acronis |
Acronis Cyber Protect Cloud Agent |
2025-06-04T12:02:21.200Z | 2026-03-17T14:16:31.804Z |
| CVE-2025-22978 |
9.8 (3.1)
|
eladmin <=2.7 is vulnerable to CSV Injection in t… |
n/a |
n/a |
2025-02-03T00:00:00.000Z | 2026-03-17T14:15:00.480Z |
| CVE-2024-54819 |
9.1 (3.1)
|
I, Librarian before and including 5.11.1 is vulne… |
n/a |
n/a |
2025-01-07T00:00:00.000Z | 2026-03-17T14:14:39.779Z |
| CVE-2026-32342 |
4.3 (3.1)
|
WordPress Quiz Maker plugin <= 6.7.1.2 - Cross Site Re… |
Ays Pro |
Quiz Maker |
2026-03-13T11:41:57.370Z | 2026-03-17T14:11:42.864Z |
| CVE-2026-4163 |
9.3 (4.0)
9.8 (3.1)
9.8 (3.0)
|
Wavlink WL-WN579A3 POST Request wireless.cgi GuestWifi… |
Wavlink |
WL-WN579A3 |
2026-03-14T22:32:10.502Z | 2026-03-17T14:11:25.056Z |
| CVE-2026-4177 |
9.1 (3.1)
|
YAML::Syck versions through 1.36 for Perl has several … |
TODDR |
YAML::Syck |
2026-03-16T22:30:25.367Z | 2026-03-17T14:04:53.600Z |
| CVE-2025-52649 |
1.8 (3.1)
|
HCL AION is affected by a vulnerability where certain … |
HCL |
AION |
2026-03-16T14:36:32.396Z | 2026-03-17T14:03:14.368Z |
| CVE-2025-69902 |
9.8 (3.1)
|
A command injection vulnerability in the minimal_… |
n/a |
n/a |
2026-03-16T00:00:00.000Z | 2026-03-17T14:01:39.958Z |
| CVE-2025-50881 |
8.8 (3.1)
|
The `flow/admin/moniteur.php` script in Use It Fl… |
n/a |
n/a |
2026-03-16T00:00:00.000Z | 2026-03-17T13:59:00.502Z |
| CVE-2025-66687 |
7.5 (3.1)
|
Doom Launcher 3.8.1.0 is vulnerable to Directory … |
n/a |
n/a |
2026-03-16T00:00:00.000Z | 2026-03-17T13:55:53.024Z |
| CVE-2025-69783 |
7.8 (3.1)
|
A local attacker can bypass OpenEDR's 2.5.1.0 sel… |
n/a |
n/a |
2026-03-16T00:00:00.000Z | 2026-03-17T13:54:12.332Z |
| CVE-2026-4167 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Belkin F9K1122 formReboot stack-based overflow |
Belkin |
F9K1122 |
2026-03-15T05:32:10.557Z | 2026-03-17T13:48:43.966Z |
| CVE-2026-4166 |
5.1 (4.0)
3.5 (3.1)
3.5 (3.0)
|
Wavlink WL-NU516U1 login.cgi sub_404F68 cross site scripting |
Wavlink |
WL-NU516U1 |
2026-03-15T05:32:08.404Z | 2026-03-17T13:46:28.034Z |
| CVE-2026-32344 |
4.3 (3.1)
|
WordPress Corpiva theme <= 1.0.96 - Cross Site Request… |
desertthemes |
Corpiva |
2026-03-13T11:41:57.714Z | 2026-03-17T13:46:21.008Z |
| CVE-2026-4165 |
4.8 (4.0)
2.4 (3.1)
2.4 (3.0)
|
Worksuite HR, CRM and Project Management create cross … |
Worksuite |
HR, CRM and Project Management |
2026-03-15T05:02:07.832Z | 2026-03-17T13:45:03.502Z |
| CVE-2026-28779 |
N/A
|
Apache Airflow: Path of session token in cookie does n… |
Apache Software Foundation |
Apache Airflow |
2026-03-17T10:15:59.132Z | 2026-03-17T13:45:02.518Z |
| CVE-2026-4164 |
9.3 (4.0)
9.8 (3.1)
9.8 (3.0)
|
Wavlink WL-WN578W2 POST Request wireless.cgi GuestWifi… |
Wavlink |
WL-WN578W2 |
2026-03-15T03:02:10.413Z | 2026-03-17T13:42:57.181Z |
| CVE-2026-30911 |
N/A
|
Apache Airflow: Execution API HITL Endpoints Missing P… |
Apache Software Foundation |
Apache Airflow |
2026-03-17T10:53:02.587Z | 2026-03-17T13:42:05.272Z |
| CVE-2026-32364 |
7.5 (3.1)
|
WordPress Turbo Manager plugin < 4.0.8 - Local File In… |
redqteam |
Turbo Manager |
2026-03-13T11:42:05.501Z | 2026-03-17T13:39:00.255Z |
| CVE-2026-28430 |
9.3 (4.0)
|
Chamilo LMS Vulnerable to Unauthenticated SQL Injectio… |
chamilo |
chamilo-lms |
2026-03-16T19:13:58.544Z | 2026-03-17T13:38:36.572Z |
| CVE-2026-26304 |
4.3 (3.1)
|
Permission Bypass in Playbook Run Creation |
Mattermost |
Mattermost |
2026-03-16T19:53:21.650Z | 2026-03-17T13:38:03.996Z |
| CVE-2026-2454 |
5.8 (3.1)
|
DoS in Calls plugin via malformed msgpack in websocket… |
Mattermost |
Mattermost |
2026-03-16T20:10:16.644Z | 2026-03-17T13:37:43.947Z |
| CVE-2026-26230 |
3.8 (3.1)
|
Team Admin Privilege Escalation to Demote Members to Guest |
Mattermost |
Mattermost |
2026-03-16T20:19:51.287Z | 2026-03-17T13:37:17.914Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-31954 |
0 (3.1)
|
Emlog asynchronous media file deletion missing CSRF pr… |
emlog |
emlog |
2026-03-11T19:21:52.781Z | 2026-03-12T20:01:11.679Z |
| CVE-2026-26975 |
8.8 (3.1)
|
Music Assistant Server Path Traversal in Playlist Upda… |
music-assistant |
server |
2026-02-20T00:49:03.306Z | 2026-02-20T15:35:58.447Z |
| CVE-2026-32117 |
7.6 (3.1)
|
grafanacubism-panel : Stored XSS via javascript: URL i… |
ekacnet |
grafanacubism-panel |
2026-03-11T21:28:38.122Z | 2026-03-12T19:29:56.170Z |
| CVE-2025-12697 |
2.2 (3.1)
|
Improper Encoding or Escaping of Output in GitLab |
GitLab |
GitLab |
2026-03-11T16:06:00.688Z | 2026-03-11T17:23:04.370Z |
| CVE-2025-12704 |
3.5 (3.1)
|
Missing Authorization in GitLab |
GitLab |
GitLab |
2026-03-11T16:05:55.759Z | 2026-03-12T16:20:13.909Z |
| CVE-2026-0602 |
4.3 (3.1)
|
Authentication Bypass Using an Alternate Path or Chann… |
GitLab |
GitLab |
2026-03-11T16:05:20.680Z | 2026-03-11T19:36:50.673Z |
| CVE-2026-1230 |
4.1 (3.1)
|
Use of Incorrectly-Resolved Name or Reference in GitLab |
GitLab |
GitLab |
2026-03-11T16:05:00.849Z | 2026-03-11T19:46:36.143Z |
| CVE-2026-31826 |
6.8 (4.0)
|
pypdf: manipulated stream length values can exhaust RAM |
py-pdf |
pypdf |
2026-03-10T21:36:52.186Z | 2026-03-11T15:59:26.902Z |
| CVE-2026-27962 |
9.1 (3.1)
|
Authlib JWS JWK Header Injection: Signature Verificati… |
authlib |
authlib |
2026-03-16T17:34:38.946Z | 2026-03-18T03:55:29.679Z |
| CVE-2026-28490 |
8.3 (4.0)
|
Authlib Vulnerable to JWE RSA1_5 Bleichenbacher Paddin… |
authlib |
authlib |
2026-03-16T17:37:57.425Z | 2026-03-16T18:17:35.003Z |
| CVE-2026-25803 |
9.8 (3.1)
|
3DP-MANAGER Uses Hard-coded Credentials |
denpiligrim |
3dp-manager |
2026-02-06T22:52:40.631Z | 2026-02-09T15:25:57.618Z |
| CVE-2026-25762 |
7.5 (3.1)
|
AdonisJS vulnerable to Denial of Service (DoS) via Unr… |
adonisjs |
core |
2026-02-06T22:48:55.471Z | 2026-02-09T15:26:05.149Z |
| CVE-2026-25754 |
7.2 (3.1)
|
AdonisJS multipart body parsing has Prototype Pollutio… |
adonisjs |
core |
2026-02-06T22:48:38.668Z | 2026-02-09T15:26:12.060Z |
| CVE-2019-25517 |
8.8 (4.0)
8.2 (3.1)
|
Jettweb PHP Hazir Haber Sitesi Scripti V1 SQL Injectio… |
Jettweb |
Hazir Haber Sitesi Scripti |
2026-03-12T15:36:50.006Z | 2026-03-12T18:50:42.310Z |
| CVE-2026-28498 |
8.2 (4.0)
|
Authlib: Fail-Open Cryptographic Verification in OIDC … |
authlib |
authlib |
2026-03-16T18:03:28.821Z | 2026-03-16T18:14:42.149Z |
| CVE-2025-66564 |
7.5 (3.1)
|
Sigstore Timestamp Authority allocates excessive memor… |
sigstore |
timestamp-authority |
2025-12-04T22:37:13.307Z | 2025-12-05T14:55:53.273Z |
| CVE-2019-25518 |
8.8 (4.0)
8.2 (3.1)
|
Jettweb PHP Hazir Haber Sitesi Scripti V1 SQL Injectio… |
Jettweb |
Hazir Haber Sitesi Scripti |
2026-03-12T15:36:50.751Z | 2026-03-12T18:48:39.515Z |
| CVE-2025-67506 |
9.8 (3.1)
|
PipesHub Vulnerable to Path Traversal through Unauthen… |
pipeshub-ai |
pipeshub-ai |
2025-12-10T00:36:16.730Z | 2025-12-10T15:35:47.244Z |
| CVE-2026-25923 |
8.7 (4.0)
|
Phar Deserialization leading to Arbitrary File Deletio… |
My-Little-Forum |
mylittleforum |
2026-02-09T21:56:02.862Z | 2026-02-11T21:20:25.222Z |
| CVE-2025-67499 |
6.6 (3.1)
|
CNI Plugins Portmap nftables backend intercepts non-lo… |
containernetworking |
plugins |
2025-12-09T23:13:22.398Z | 2025-12-10T16:50:10.430Z |
| CVE-2019-25519 |
8.8 (4.0)
8.2 (3.1)
|
Jettweb PHP Hazir Haber Sitesi Scripti V1 SQL Injection |
Jettweb |
Hazir Haber Sitesi Scripti |
2026-03-12T15:36:51.617Z | 2026-03-12T18:45:26.122Z |
| CVE-2026-26013 |
3.7 (3.1)
|
LangChain affected by SSRF via image_url token countin… |
langchain-ai |
langchain |
2026-02-10T21:51:07.741Z | 2026-02-11T21:26:34.029Z |
| CVE-2019-25520 |
8.8 (4.0)
8.2 (3.1)
|
Jettweb PHP Hazir Haber Sitesi Scripti V1 Authenticati… |
Jettweb |
Hazir Haber Sitesi Scripti |
2026-03-12T15:36:52.935Z | 2026-03-12T18:43:47.951Z |
| CVE-2026-22183 |
5.3 (4.0)
6.1 (3.1)
|
wpDiscuz before 7.6.47 - Stored Cross-Site Scripting i… |
gVectors |
wpDiscuz |
2026-03-13T01:18:00.616Z | 2026-03-13T14:17:15.681Z |
| CVE-2026-22192 |
6.3 (4.0)
6.1 (3.1)
|
wpDiscuz before 7.6.47 - Stored Cross-Site Scripting v… |
gVectors |
wpDiscuz |
2026-03-13T01:18:03.921Z | 2026-03-13T15:04:21.947Z |
| CVE-2025-66631 |
7.2 (4.0)
|
CSLA .NET is vulnerable to Remote Code Execution via W… |
MarimerLLC |
csla |
2025-12-09T03:18:37.698Z | 2025-12-09T15:15:06.460Z |
| CVE-2026-22193 |
9.2 (4.0)
8.1 (3.1)
|
wpDiscuz before 7.6.47 - SQL Injection in getAllSubscr… |
gVectors |
wpDiscuz |
2026-03-13T01:18:05.494Z | 2026-03-13T16:10:03.471Z |
| CVE-2026-28522 |
7.1 (4.0)
6.5 (3.1)
|
arduino-TuyaOpen WiFiUDP Null Pointer Dereference Deni… |
Tuya |
arduino-TuyaOpen |
2026-03-15T13:36:52.798Z | 2026-03-16T14:20:18.964Z |
| CVE-2025-66622 |
1.3 (4.0)
|
matrix-sdk-base is vulnerable to DoS via custom m.room… |
matrix-org |
matrix-rust-sdk |
2025-12-09T02:07:18.831Z | 2025-12-09T16:02:47.455Z |
| CVE-2026-22199 |
6.9 (4.0)
5.3 (3.1)
|
wpDiscuz before 7.6.47 - Vote Manipulation via Nonce O… |
gVectors |
wpDiscuz |
2026-03-13T01:18:06.507Z | 2026-03-13T16:09:40.962Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-3826 | IFTOP developed by WellChoose has a Local File Inclusion vulnerability, allowing unauthenticated re… | 2026-03-11T07:17:00.207 | 2026-03-17T19:27:21.680 |
| fkie_cve-2026-32313 | xmlseclibs is a library written in PHP for working with XML Encryption and Signatures. Prior to 3.1… | 2026-03-16T14:19:33.837 | 2026-03-17T19:25:41.563 |
| fkie_cve-2026-32600 | xml-security is a library that implements XML signatures and encryption. Prior to versions 2.3.1 an… | 2026-03-16T14:19:38.953 | 2026-03-17T19:25:09.150 |
| fkie_cve-2026-21888 | NanoMQ MQTT Broker (NanoMQ) is an all-around Edge Messaging Platform. MQTT v5 Variable Byte Integer… | 2026-03-11T16:16:23.930 | 2026-03-17T19:20:17.350 |
| fkie_cve-2026-28803 | Open Forms allows users create and publish smart forms. Prior to 3.3.13 and 3.4.5, to be able to co… | 2026-03-11T16:16:40.630 | 2026-03-17T19:19:19.560 |
| fkie_cve-2022-36313 | An issue was discovered in the file-type package before 16.5.4 and 17.x before 17.1.3 for Node.js. … | 2022-07-21T16:15:09.297 | 2026-03-17T19:18:04.083 |
| fkie_cve-2026-31892 | Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs o… | 2026-03-11T16:16:44.033 | 2026-03-17T19:17:55.270 |
| fkie_cve-2026-32354 | Insertion of Sensitive Information Into Sent Data vulnerability in magepeopleteam WpEvently mage-ev… | 2026-03-13T19:54:47.590 | 2026-03-17T19:16:02.427 |
| fkie_cve-2026-3207 | Configuration issue in Java Management Extensions (JMX) in TIBCO BPM Enterprise version 4.x allows … | 2026-03-17T19:16:02.637 | 2026-03-17T19:16:02.637 |
| fkie_cve-2026-25790 | Wazuh is a free and open source platform used for threat prevention, detection, and response. Start… | 2026-03-17T19:16:01.493 | 2026-03-17T19:16:01.493 |
| fkie_cve-2026-25772 | Wazuh is a free and open source platform used for threat prevention, detection, and response. Start… | 2026-03-17T19:16:01.260 | 2026-03-17T19:16:01.260 |
| fkie_cve-2026-25771 | Wazuh is a free and open source platform used for threat prevention, detection, and response. Start… | 2026-03-17T19:16:01.083 | 2026-03-17T19:16:01.083 |
| fkie_cve-2026-25769 | Wazuh is a free and open source platform used for threat prevention, detection, and response. Versi… | 2026-03-17T18:16:15.267 | 2026-03-17T19:16:00.957 |
| fkie_cve-2026-21570 | This High severity RCE (Remote Code Execution) vulnerability was introduced in versions 9.6.0, 10.… | 2026-03-17T18:16:14.870 | 2026-03-17T19:16:00.600 |
| fkie_cve-2026-30868 | OPNsense is a FreeBSD based firewall and routing platform. Prior to 26.1.4, multiple OPNsense MVC A… | 2026-03-11T17:16:57.937 | 2026-03-17T19:13:04.247 |
| fkie_cve-2026-32627 | cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library. Prior to 0.37.2, … | 2026-03-16T14:19:40.270 | 2026-03-17T19:08:44.583 |
| fkie_cve-2026-31853 | ImageMagick is free and open-source software used for editing and manipulating digital images. Prio… | 2026-03-11T17:16:58.760 | 2026-03-17T19:08:12.847 |
| fkie_cve-2026-30226 | Svelte devalue is a JavaScript library that serializes values into strings when JSON.stringify isn'… | 2026-03-11T18:16:22.937 | 2026-03-17T19:07:28.660 |
| fkie_cve-2026-31861 | Cloud CLI (aka Claude Code UI) is a desktop and mobile UI for Claude Code, Cursor CLI, Codex, and G… | 2026-03-11T18:16:24.887 | 2026-03-17T19:06:41.493 |
| fkie_cve-2026-32630 | file-type detects the file type of a file, stream, or data. From 20.0.0 to 21.3.1, a crafted ZIP fi… | 2026-03-16T14:19:40.593 | 2026-03-17T19:05:56.580 |
| fkie_cve-2026-31862 | Cloud CLI (aka Claude Code UI) is a desktop and mobile UI for Claude Code, Cursor CLI, Codex, and G… | 2026-03-11T18:16:25.073 | 2026-03-17T19:04:29.000 |
| fkie_cve-2024-8776 | SmartRobot from INTUMIT does not properly validate a specific page parameter, allowing unautheticat… | 2024-09-16T06:15:11.023 | 2026-03-17T19:03:05.877 |
| fkie_cve-2026-32704 | SiYuan is a personal knowledge management system. Prior to 3.6.1, POST /api/template/renderSprig la… | 2026-03-16T14:19:41.233 | 2026-03-17T19:02:25.640 |
| fkie_cve-2026-32729 | Runtipi is a personal homeserver orchestrator. Prior to 4.8.1, The Runtipi /api/auth/verify-totp en… | 2026-03-16T14:19:43.400 | 2026-03-17T19:01:54.250 |
| fkie_cve-2024-2413 | Intumit SmartRobot uses a fixed encryption key for authentication. Remote attackers can use this ke… | 2024-03-13T03:15:06.793 | 2026-03-17T19:01:25.253 |
| fkie_cve-2026-2923 | GStreamer DVB Subtitles Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability… | 2026-03-16T14:19:33.013 | 2026-03-17T18:59:35.180 |
| fkie_cve-2026-2922 | GStreamer RealMedia Demuxer Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerabi… | 2026-03-16T14:19:32.877 | 2026-03-17T18:59:21.860 |
| fkie_cve-2026-2921 | GStreamer RIFF Palette Integer Overflow Remote Code Execution Vulnerability. This vulnerability all… | 2026-03-16T14:19:32.730 | 2026-03-17T18:59:00.343 |
| fkie_cve-2026-2920 | GStreamer ASF Demuxer Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerab… | 2026-03-16T14:19:31.637 | 2026-03-17T18:58:45.980 |
| fkie_cve-2024-0552 | Intumit inc. SmartRobot's web framwork has a remote code execution vulnerability. An unauthorized r… | 2024-01-15T04:15:08.260 | 2026-03-17T18:58:29.600 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-9cmf-qgf8-jfxf |
5.0 (3.1)
|
Path Traversal: '.../...//' vulnerability in Bogdan Bendziukov Squeeze squeeze allows Path Traversa… | 2026-03-13T21:31:49Z | 2026-03-17T15:36:19Z |
| ghsa-q336-5c62-jqr6 |
7.5 (3.1)
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2026-03-13T21:31:48Z | 2026-03-17T15:36:18Z |
| ghsa-p8mg-5f3g-25qc |
5.3 (3.1)
|
Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in RadiusT… | 2026-03-13T21:31:48Z | 2026-03-17T15:36:18Z |
| ghsa-mq87-vh9m-w8jp |
4.3 (3.1)
|
Cross-Site Request Forgery (CSRF) vulnerability in desertthemes Corpiva corpiva allows Cross Site R… | 2026-03-13T21:31:48Z | 2026-03-17T15:36:18Z |
| ghsa-jwpp-jwg5-pq7x |
4.3 (3.1)
|
Cross-Site Request Forgery (CSRF) vulnerability in Ays Pro Quiz Maker quiz-maker allows Cross Site … | 2026-03-13T21:31:47Z | 2026-03-17T15:36:18Z |
| ghsa-xh35-43pp-33v2 |
3.1 (3.1)
0.0 (4.0)
|
Vulnerability in Wikimedia Foundation MediaWiki. This vulnerability is associated with program file… | 2026-02-03T00:30:19Z | 2026-03-17T15:36:17Z |
| ghsa-mq59-m269-xvcx |
5.3 (4.0)
|
Next.js: null origin can bypass Server Actions CSRF checks | 2026-03-17T15:30:14Z | 2026-03-17T15:30:14Z |
| ghsa-jcc7-9wpm-mj36 |
2.3 (4.0)
|
Next.js: null origin can bypass dev HMR websocket CSRF checks | 2026-03-17T15:29:48Z | 2026-03-17T15:29:48Z |
| ghsa-cc7p-2j3x-x7xf |
7.7 (4.0)
|
Craft CMS Vulnerable to Privilege Escalation/Bypass through UsersController->actionImpersonateWithToken() | 2026-03-16T18:44:20Z | 2026-03-17T15:23:51Z |
| ghsa-4mx9-3c2h-hwhg |
9.3 (3.1)
|
SiYuan has a SanitizeSVG bypass via data:text/xml in getDynamicIcon (incomplete fix for CVE-2026-29183) | 2026-03-17T14:08:11Z | 2026-03-17T14:08:12Z |
| ghsa-fq2j-j8hc-8vw8 |
9.9 (3.1)
|
SiYuan Vulnerable to Arbitrary File Read in Desktop Publish Service | 2026-03-17T14:07:57Z | 2026-03-17T14:07:57Z |
| ghsa-v7cf-c9rm-wm3j |
7.1 (4.0)
|
Uncontrolled recursion DoS in JustHTML() via deeply nested HTML | 2026-03-17T14:07:38Z | 2026-03-17T14:07:38Z |
| ghsa-xxmc-fm3p-q3x8 |
5.3 (3.1)
|
A flaw was found in libsoup, a library for handling HTTP requests. This vulnerability, known as a U… | 2026-03-17T12:30:20Z | 2026-03-17T12:30:20Z |
| ghsa-f5f8-5jp8-vj3c |
2.7 (3.1)
|
HCL Sametime is vulnerable to broken server-side validation. While the application performs client-… | 2026-03-17T12:30:20Z | 2026-03-17T12:30:20Z |
| ghsa-v5mp-vx4p-jwp6 |
3.9 (3.1)
|
A flaw was found in libsoup, a library used by applications to send network requests. This vulnerab… | 2026-03-17T12:30:19Z | 2026-03-17T12:30:19Z |
| ghsa-q4hc-vp2m-fr47 |
7.2 (3.1)
|
A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `sch… | 2026-02-23T18:32:02Z | 2026-03-17T12:30:19Z |
| ghsa-jx6g-363c-pprr |
3.9 (3.1)
|
A flaw was found in libsoup. An attacker controlling the value used to set the Content-Type header … | 2026-03-17T12:30:19Z | 2026-03-17T12:30:19Z |
| ghsa-h5q3-ggp6-vf4c |
|
In the Linux kernel, the following vulnerability has been resolved: audit: add fchmodat2() to chan… | 2026-03-17T12:30:19Z | 2026-03-17T12:30:19Z |
| ghsa-c2fm-fx6j-95j7 |
|
In the Linux kernel, the following vulnerability has been resolved: audit: add missing syscalls to… | 2026-03-17T12:30:19Z | 2026-03-17T12:30:19Z |
| ghsa-6p72-283f-crv2 |
3.9 (3.1)
|
A flaw was found in libsoup. A remote attacker, by controlling the method parameter of the `soup_me… | 2026-03-17T12:30:19Z | 2026-03-17T12:30:19Z |
| ghsa-wc8x-254r-w3mh |
7.5 (3.1)
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2026-02-19T18:31:53Z | 2026-03-17T09:31:28Z |
| ghsa-q8w5-c2m8-wxrx |
2.3 (4.0)
|
In affected versions of Octopus Server it was possible for a low privileged user to manipulate an A… | 2026-03-17T09:31:28Z | 2026-03-17T09:31:28Z |
| ghsa-p5g2-8j3h-474p |
5.3 (3.1)
|
Missing Authorization vulnerability in Pluggabl Booster for WooCommerce allows Exploiting Incorrect… | 2026-03-17T09:31:28Z | 2026-03-17T09:31:28Z |
| ghsa-92gg-mqgx-hqg4 |
9.8 (3.1)
9.3 (4.0)
|
GCB/FCB Audit Software developed by DrangSoft has a Missing Authentication vulnerability, allowing … | 2026-03-17T09:31:28Z | 2026-03-17T09:31:28Z |
| ghsa-755r-r738-mjgp |
2.3 (4.0)
|
The extension fails to verify, if an authenticated user has permissions to access to redirects resu… | 2026-03-17T09:31:28Z | 2026-03-17T09:31:28Z |
| ghsa-29r8-gvx4-r9w3 |
7.7 (4.0)
|
The extension fails to properly reset the generated MFA code after successful authentication. This … | 2026-03-17T09:31:28Z | 2026-03-17T09:31:28Z |
| ghsa-gxf2-jfmj-j5cj |
8.3 (3.1)
|
A flaw was found in libucl. A remote attacker could exploit this by providing a specially crafted U… | 2026-03-17T06:31:32Z | 2026-03-17T06:31:32Z |
| ghsa-fcq3-632g-qpmv |
4.3 (3.1)
2.1 (4.0)
|
A security flaw has been discovered in frdel/agent0ai agent-zero 0.9.7-10. The impacted element is … | 2026-03-17T06:31:32Z | 2026-03-17T06:31:32Z |
| ghsa-8g9j-3hrr-2hvm |
6.3 (3.1)
2.1 (4.0)
|
A weakness has been identified in frdel/agent0ai agent-zero 0.9.7. This affects the function handle… | 2026-03-17T06:31:32Z | 2026-03-17T06:31:32Z |
| ghsa-2w8x-224x-785m |
7.5 (3.1)
7.7 (4.0)
|
All versions of the package sjcl are vulnerable to Improper Verification of Cryptographic Signature… | 2026-03-17T06:31:32Z | 2026-03-17T06:31:32Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2008-13 |
|
Multiple cross-site scripting (XSS) vulnerabilities in macro/AdvancedSearch.py in moin (a… | moin | 2008-07-30T18:41:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2008-12 |
|
The user form processing (userform.py) in MoinMoin before 1.6.3, when using ACLs or a non… | moin | 2008-04-25T06:05:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2007-4 |
|
Plone 2.5 through 2.5.4 and 3.0 through 3.0.2 allows remote attackers to execute arbitrar… | plone | 2007-11-07T21:46:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2006-6 |
|
Unspecified vulnerability in PlonePAS in Plone 2.5 and 2.5.1, when anonymous member regis… | Plone | 2006-12-07T23:28:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2006-5 |
|
Unspecified vulnerability in the Password Reset Tool before 0.4.1 on Plone 2.5 and 2.5.1 … | Plone | 2006-09-29T19:07:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2022-43072 |
7.5 (3.1)
|
An inflation issue was discovered in Chia Network CAT1 Standard 1.0.0. Previously minted … | chia-blockchain | 2022-07-29T21:15:00Z | 2024-11-25T18:33:04.123836Z |
| pysec-2022-43068 |
6.3 (3.1)
|
A race condition flaw was found in ansible-runner, where an attacker could watch for rapi… | ansible-runner | 2022-08-23T16:15:00Z | 2024-11-25T18:33:04.123836Z |
| pysec-2022-43067 |
6.6 (3.1)
|
A flaw was found in ansible-runner where the default temporary files configuration in ans… | ansible-runner | 2022-08-23T16:15:00Z | 2024-11-25T18:33:04.123836Z |
| pysec-2013-35 |
|
The clear_volume function in LVMVolumeDriver driver in OpenStack Cinder 2013.1.1 through … | cinder | 2013-09-16T19:14:00Z | 2024-11-25T18:33:04.123836Z |
| pysec-2022-43063 |
9.8 (3.1)
|
Code injection in paddle.audio.functional.get_window in PaddlePaddle 2.4.0-rc0 allows arb… | paddlepaddle | 2022-12-07T09:15:00+00:00 | 2024-11-22T12:27:25.862098+00:00 |
| pysec-2024-151 |
5.3 (3.1)
|
Vyper is a pythonic Smart Contract Language for the ethereum virtual machine. Vyper compi… | vyper | 2024-01-30T21:15:00+00:00 | 2024-11-21T14:23:03.091183+00:00 |
| pysec-2024-150 |
9.8 (3.1)
|
Vyper is a Pythonic Smart Contract Language for the Ethereum Virtual Machine. Arrays can … | vyper | 2024-02-07T17:15:00+00:00 | 2024-11-21T14:23:03.024978+00:00 |
| pysec-2022-43176 |
9.8 (3.1)
|
The Zibal package in PyPI v1.0.0 was discovered to contain a code execution backdoor. Thi… | zibal | 2022-06-24T21:15:00Z | 2024-11-21T14:23:03.404044Z |
| pysec-2022-43175 |
6.1 (3.1)
|
Drag and Drop XBlock v2 implements a drag-and-drop style problem, where a learner has to … | xblock-drag-and-drop-v2 | 2022-11-28T21:15:00+00:00 | 2024-11-21T14:23:03.352390+00:00 |
| pysec-2022-43173 |
9.8 (3.1)
|
The wikifaces package in PyPI v1.0 included a code execution backdoor inserted by a third… | wikifaces | 2022-07-22T15:15:00Z | 2024-11-21T14:23:03.244154Z |
| pysec-2022-43172 |
9.8 (3.1)
|
The Watertools package in PyPI v0.0.0 was discovered to contain a code execution backdoor… | watertools | 2022-06-24T21:15:00Z | 2024-11-21T14:23:03.143453Z |
| pysec-2019-256 |
7.5 (3.1)
|
In libwebp 0.5.1, there is a double free bug in libwebpmux. | webp | 2019-05-23T18:29:00Z | 2024-11-21T14:23:03.194401Z |
| pysec-2017-148 |
6.1 (3.1)
|
Cross-site scripting (XSS) vulnerability in ZMI pages that use the manage_tabs_message in… | zope | 2017-08-07T17:29:00Z | 2024-11-21T14:23:03.459792Z |
| pysec-2006-8 |
|
The docutils module in Zope (Zope2) 2.7.0 through 2.7.9 and 2.8.0 through 2.8.8 does not … | zope2 | 2006-09-19T18:07:00Z | 2024-11-21T14:23:03.63347Z |
| pysec-2006-7 |
|
Zope 2.7.0 to 2.7.8, 2.8.0 to 2.8.7, and 2.9.0 to 2.9.3 (Zope2) does not disable the "raw… | zope2 | 2006-07-07T23:05:00Z | 2024-11-21T14:23:03.576588Z |
| pysec-2024-149 |
9.8 (3.1)
|
Vyper is a pythonic Smart Contract Language for the ethereum virtual machine. In versions… | vyper | 2024-02-01T17:15:00+00:00 | 2024-11-21T14:23:02.970591+00:00 |
| pysec-2024-148 |
5.3 (3.1)
|
Vyper is a Pythonic Smart Contract Language for the Ethereum Virtual Machine. When calls … | vyper | 2024-02-02T17:15:00+00:00 | 2024-11-21T14:23:02.917464+00:00 |
| pysec-2024-147 |
5.3 (3.1)
|
Vyper is a Pythonic Smart Contract Language for the EVM. There is an error in the stack m… | vyper | 2024-02-05T21:15:00+00:00 | 2024-11-21T14:23:02.864019+00:00 |
| pysec-2023-307 |
7.5 (3.1)
|
Vyper is a Pythonic Smart Contract Language for the Ethereum Virtual Machine (EVM). Contr… | vyper | 2023-12-13T20:15:00+00:00 | 2024-11-21T14:23:02.808922+00:00 |
| pysec-2023-306 |
8.1 (3.1)
|
Vyper is a Pythonic Smart Contract Language for the Ethereum Virtual Machine (EVM). In ve… | vyper | 2023-09-18T21:16:00+00:00 | 2024-11-21T14:23:02.752932+00:00 |
| pysec-2023-305 |
5.3 (3.1)
|
Vyper is a Pythonic Smart Contract Language for the Ethereum Virtual Machine (EVM). Start… | vyper | 2023-09-18T21:16:00+00:00 | 2024-11-21T14:23:02.698147+00:00 |
| pysec-2023-304 |
8.8 (3.1)
|
vantage6 is a framework to manage and deploy privacy enhancing technologies like Federate… | vantage6-server | 2023-11-14T21:15:00+00:00 | 2024-11-21T14:23:02.641254+00:00 |
| pysec-2023-303 |
8.8 (3.1)
|
vantage6 is a framework to manage and deploy privacy enhancing technologies like Federate… | vantage6-node | 2023-11-14T21:15:00+00:00 | 2024-11-21T14:23:02.574095+00:00 |
| pysec-2022-43171 |
7.5 (3.1)
|
An XML Entity Expansion (XEE) issue was discovered in Tryton Application Platform (Server… | tryton | 2022-03-10T17:47:00+00:00 | 2024-11-21T14:23:02.453983+00:00 |
| pysec-2022-43170 |
6.5 (3.1)
|
An XXE issue was discovered in Tryton Application Platform (Server) 5.x through 5.0.45, 6… | tryton | 2022-03-10T17:47:00+00:00 | 2024-11-21T14:23:02.248212+00:00 |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-4262 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.557062Z |
| gsd-2024-4261 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.534179Z |
| gsd-2024-4260 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.587447Z |
| gsd-2024-4259 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.580041Z |
| gsd-2024-4258 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.581681Z |
| gsd-2024-4257 | A vulnerability was found in BlueNet Technology Clinical Browsing System 1.2.1. It has be… | 2024-04-27T05:02:16.570113Z |
| gsd-2024-4256 | A vulnerability was found in Techkshetra Info Solutions Savsoft Quiz 6.0 and classified a… | 2024-04-27T05:02:16.544284Z |
| gsd-2024-4255 | A vulnerability, which was classified as critical, has been found in Ruijie RG-UAC up to … | 2024-04-27T05:02:16.623487Z |
| gsd-2024-4254 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.587642Z |
| gsd-2024-4253 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.562905Z |
| gsd-2024-4252 | A vulnerability classified as critical has been found in Tenda i22 1.0.0.3(4687). This af… | 2024-04-27T05:02:16.602334Z |
| gsd-2024-4251 | A vulnerability was found in Tenda i21 1.0.0.14(4656). It has been rated as critical. Aff… | 2024-04-27T05:02:16.569517Z |
| gsd-2024-4250 | A vulnerability was found in Tenda i21 1.0.0.14(4656). It has been declared as critical. … | 2024-04-27T05:02:16.555748Z |
| gsd-2024-4249 | A vulnerability was found in Tenda i21 1.0.0.14(4656). It has been classified as critical… | 2024-04-27T05:02:16.524020Z |
| gsd-2024-4248 | A vulnerability was found in Tenda i21 1.0.0.14(4656) and classified as critical. This is… | 2024-04-27T05:02:16.569718Z |
| gsd-2024-4247 | A vulnerability has been found in Tenda i21 1.0.0.14(4656) and classified as critical. Th… | 2024-04-27T05:02:16.588079Z |
| gsd-2024-4246 | A vulnerability, which was classified as critical, was found in Tenda i21 1.0.0.14(4656).… | 2024-04-27T05:02:16.603900Z |
| gsd-2024-4245 | A vulnerability, which was classified as critical, has been found in Tenda i21 1.0.0.14(4… | 2024-04-27T05:02:16.558324Z |
| gsd-2024-4244 | A vulnerability classified as critical was found in Tenda W9 1.0.0.7(4456). Affected by t… | 2024-04-27T05:02:16.554860Z |
| gsd-2024-4243 | A vulnerability classified as critical has been found in Tenda W9 1.0.0.7(4456). Affected… | 2024-04-27T05:02:16.549231Z |
| gsd-2024-4242 | A vulnerability was found in Tenda W9 1.0.0.7(4456). It has been rated as critical. This … | 2024-04-27T05:02:16.596328Z |
| gsd-2024-4241 | A vulnerability was found in Tenda W9 1.0.0.7(4456). It has been declared as critical. Th… | 2024-04-27T05:02:16.531844Z |
| gsd-2024-4240 | A vulnerability was found in Tenda W9 1.0.0.7(4456). It has been classified as critical. … | 2024-04-27T05:02:16.585061Z |
| gsd-2024-4239 | A vulnerability was found in Tenda AX1806 1.0.0.1 and classified as critical. Affected by… | 2024-04-27T05:02:16.575159Z |
| gsd-2024-4238 | A vulnerability has been found in Tenda AX1806 1.0.0.1 and classified as critical. Affect… | 2024-04-27T05:02:16.577033Z |
| gsd-2024-4237 | A vulnerability, which was classified as critical, was found in Tenda AX1806 1.0.0.1. Aff… | 2024-04-27T05:02:16.532589Z |
| gsd-2024-4236 | A vulnerability, which was classified as critical, has been found in Tenda AX1803 1.0.0.1… | 2024-04-27T05:02:16.536897Z |
| gsd-2024-4235 | A vulnerability classified as problematic was found in Netgear DG834Gv5 1.6.01.34. This v… | 2024-04-27T05:02:16.608439Z |
| gsd-2024-4234 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-27T05:02:16.558629Z |
| gsd-2024-4233 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:16.618656Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-548 | Malicious code in tabletas (PyPI) | 2026-01-27T18:26:01Z | 2026-03-11T10:50:04Z |
| mal-2026-492 | Malicious code in tableates (PyPI) | 2026-01-23T13:57:05Z | 2026-03-11T10:50:04Z |
| mal-2026-490 | Malicious code in tabletes (PyPI) | 2026-01-23T10:19:25Z | 2026-03-11T10:50:04Z |
| mal-2026-441 | Malicious code in spellcheckpy (PyPI) | 2026-01-21T08:10:26Z | 2026-03-11T10:50:04Z |
| mal-2026-375 | Malicious code in spellcheckerpy (PyPI) | 2026-01-20T19:06:25Z | 2026-03-11T10:50:04Z |
| mal-2025-193013 | Malicious code in tablixs (PyPI) | 2026-02-11T10:04:22Z | 2026-03-11T10:50:04Z |
| mal-2025-193012 | Malicious code in gridifies (PyPI) | 2026-02-06T14:04:11Z | 2026-03-11T10:50:04Z |
| mal-2025-191535 | Malicious code in tableate (PyPI) | 2025-11-25T11:06:37Z | 2026-03-11T10:50:04Z |
| mal-2025-191534 | Malicious code in tablates (PyPI) | 2025-11-26T10:20:42Z | 2026-03-11T10:50:04Z |
| mal-2025-191533 | Malicious code in spellcheckers (PyPI) | 2025-11-15T18:49:10Z | 2026-03-11T10:50:04Z |
| mal-2026-1341 | Malicious code in collects (PyPI) | 2026-03-11T10:17:52Z | 2026-03-11T10:17:53Z |
| mal-2026-1339 | Malicious code in anontest123 (PyPI) | 2026-03-11T07:44:14Z | 2026-03-11T07:44:14Z |
| mal-2026-1340 | Malicious code in safetest123 (PyPI) | 2026-03-11T07:43:06Z | 2026-03-11T07:43:06Z |
| mal-2026-1335 | Malicious code in tailwindcss-animate-framer (npm) | 2026-03-11T06:26:49Z | 2026-03-11T06:26:59Z |
| mal-2026-1338 | Malicious code in vite-chunker (npm) | 2026-03-11T06:26:49Z | 2026-03-11T06:26:49Z |
| mal-2026-1336 | Malicious code in tailwindcss-forms-bundler (npm) | 2026-03-11T06:26:49Z | 2026-03-11T06:26:49Z |
| mal-2026-1333 | Malicious code in polygon-gamma-api (npm) | 2026-03-11T06:26:49Z | 2026-03-11T06:26:49Z |
| mal-2026-1328 | Malicious code in gamma-api-provider (npm) | 2026-03-11T06:26:49Z | 2026-03-11T06:26:49Z |
| mal-2026-1332 | Malicious code in mui-path-imports (npm) | 2026-03-11T06:19:33Z | 2026-03-11T06:19:33Z |
| mal-2026-1337 | Malicious code in typescript-urql (npm) | 2026-03-11T06:19:13Z | 2026-03-11T06:19:14Z |
| mal-2026-1326 | Malicious code in clean-order (npm) | 2026-03-11T06:19:13Z | 2026-03-11T06:19:14Z |
| mal-2026-1329 | Malicious code in google-camelcase (npm) | 2026-03-11T06:18:53Z | 2026-03-11T06:18:53Z |
| mal-2026-1334 | Malicious code in sort-export-all (npm) | 2026-03-11T06:17:53Z | 2026-03-11T06:18:03Z |
| mal-2026-1327 | Malicious code in filter-imports (npm) | 2026-03-11T06:17:33Z | 2026-03-11T06:17:33Z |
| mal-2026-1330 | Malicious code in import-zod (npm) | 2026-03-11T06:15:22Z | 2026-03-11T06:15:23Z |
| mal-2026-1331 | Malicious code in llm-oracle (npm) | 2026-03-11T05:58:11Z | 2026-03-11T05:58:11Z |
| mal-2026-1325 | Malicious code in synapseml-utils (PyPI) | 2026-03-10T17:57:54Z | 2026-03-10T17:57:54Z |
| mal-2026-1324 | Malicious code in test-logsmodule-v-zisko (npm) | 2026-03-10T17:00:26Z | 2026-03-10T17:00:27Z |
| mal-2026-1323 | Malicious code in bluelite-bot-manager (npm) | 2026-03-10T17:00:26Z | 2026-03-10T17:00:27Z |
| mal-2026-1234 | Malicious code in uxproject11 (npm) | 2026-02-25T05:20:29Z | 2026-03-10T12:30:19Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2026-0250 | Drupal Canvas und CAS: Mehrere Schwachstellen | 2026-01-28T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0246 | Lexmark Laser Printers: Mehrere Schwachstellen ermöglichen Ausführen von beliebigem Programmcode mit Benutzerrechten | 2026-01-28T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0210 | IBM DB2 Big SQL: Mehrere Schwachstellen | 2026-01-25T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0121 | Drupal Module: Mehrere Schwachstellen | 2026-01-14T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0090 | Mozilla Firefox und Thunderbird: Mehrere Schwachstellen | 2026-01-13T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0019 | Red Hat Enterprise Linux (Quarkus): Mehrere Schwachstellen | 2026-01-06T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2915 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-12-23T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2812 | Mozilla Firefox: Mehrere Schwachstellen | 2025-12-09T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2706 | Python: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-12-01T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2672 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-11-24T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2616 | libvirt: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-11-17T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2193 | QEMU: Schwachstelle ermöglicht Denial of Service | 2025-10-05T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2144 | binutils: Mehrere Schwachstellen | 2025-09-28T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2134 | Red Hat Enterprise Linux (Developer Hub): Schwachstelle ermöglicht Denial of Service | 2025-09-25T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2107 | Linux Kernel: Mehrere Schwachstellen | 2025-09-22T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2078 | Red Hat Enterprise Linux (Developer Hub): Mehrere Schwachstellen | 2025-09-16T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-1948 | libxml2 (exsltDynMapFunction): Schwachstelle ermöglicht Denial of Service | 2025-09-02T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-1928 | Linux UDisks Daemon: Schwachstelle ermöglicht Privilegieneskalation | 2025-08-28T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-1842 | PostgreSQL: Mehrere Schwachstellen | 2025-08-14T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-1699 | Red Hat Enterprise Linux (requests): Schwachstelle ermöglicht das Ausspähen von Informationen | 2025-08-03T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-1423 | libssh: Mehrere Schwachstellen | 2025-06-29T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-1143 | Red Hat Enterprise Linux (python-tornado): Schwachstelle ermöglicht Denial of Service | 2025-05-25T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-0964 | Django: Schwachstelle ermöglicht Denial of Service | 2025-05-07T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-0453 | Linux Kernel: Mehrere Schwachstellen | 2025-02-26T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-0353 | GNU Emacs: Schwachstelle ermöglicht Codeausführung | 2025-02-11T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2024-3762 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2024-12-29T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2024-3558 | GNU Emacs und Red Hat Enterprise Linux: Schwachstelle ermöglicht Codeausführung | 2024-11-27T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2024-3542 | Red Hat OpenShift: Mehrere Schwachstellen | 2024-11-25T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2024-2067 | Golang Go: Mehrere Schwachstellen ermöglichen Denial of Service | 2024-09-05T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2022-1538 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2022-09-26T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsma-25-296-01 | NIHON KOHDEN Central Monitor CNS-6201 | 2025-10-23T06:00:00.000000Z | 2025-10-23T06:00:00.000000Z |
| icsa-25-296-04 | Delta Electronics ASDA-Soft | 2025-10-23T06:00:00.000000Z | 2025-10-23T06:00:00.000000Z |
| icsa-25-296-03 | Veeder-Root TLS4B Automatic Tank Gauge System | 2025-10-23T06:00:00.000000Z | 2025-10-23T06:00:00.000000Z |
| icsa-25-296-02 | ASKI Energy ALS-Mini-S8 and ALS-Mini-S4 | 2025-10-23T06:00:00.000000Z | 2025-10-23T06:00:00.000000Z |
| icsa-25-296-01 | AutomationDirect Productivity Suite | 2025-10-23T06:00:00.000000Z | 2025-10-23T06:00:00.000000Z |
| icsa-25-294-02 | Rockwell Automation Compact GuardLogix 5370 | 2025-10-21T06:00:00.000000Z | 2025-10-23T06:00:00.000000Z |
| icsa-25-294-01 | Rockwell Automation 1783-NATR | 2025-10-21T06:00:00.000000Z | 2025-10-23T06:00:00.000000Z |
| icsa-25-289-02 | Rockwell Automation FactoryTalk Linx | 2025-10-16T06:00:00.000000Z | 2025-10-23T06:00:00.000000Z |
| icsa-25-280-01 | Delta Electronics DIAScreen | 2025-10-07T06:00:00.000000Z | 2025-10-23T06:00:00.000000Z |
| icsa-25-037-02 | Schneider Electric EcoStruxure (Update C) | 2025-02-06T07:00:00.000000Z | 2025-10-23T06:00:00.000000Z |
| va-25-296-01 | Frontier Airlines website publicly available email address validation | 2025-10-23T00:00:00Z | 2025-10-23T00:00:00Z |
| icsma-25-294-01 | Oxford Nanopore Technologies MinKNOW | 2025-10-21T06:00:00.000000Z | 2025-10-21T06:00:00.000000Z |
| icsa-25-294-06 | Raisecomm RAX701-GC Series | 2025-10-21T06:00:00.000000Z | 2025-10-21T06:00:00.000000Z |
| icsa-25-294-05 | CloudEdge Online Cameras and App | 2025-10-21T06:00:00.000000Z | 2025-10-21T06:00:00.000000Z |
| icsa-24-354-07 | Schneider Electric Modicon Controllers (Update A) | 2024-12-19T07:00:00.000000Z | 2025-10-21T06:00:00.000000Z |
| va-25-289-01 | OPEXUS FOIAXpress unauthenticated administrator password reset | 2025-10-16T16:43:55Z | 2025-10-16T16:43:55Z |
| icsa-25-289-04 | Rockwell Automation ArmorStart AOP | 2025-10-16T06:00:00.000000Z | 2025-10-16T06:00:00.000000Z |
| icsa-25-289-03 | Rockwell Automation FactoryTalk ViewPoint | 2025-10-16T06:00:00.000000Z | 2025-10-16T06:00:00.000000Z |
| icsa-25-289-01 | Rockwell Automation FactoryTalk View Machine Edition and PanelView Plus 7 | 2025-10-16T06:00:00.000000Z | 2025-10-16T06:00:00.000000Z |
| icsa-24-121-01 | Delta Electronics CNCSoft-G2 DOPSoft (Update A) | 2024-04-30T06:00:00.000000Z | 2025-10-16T06:00:00.000000Z |
| icsa-25-301-01 | Schneider Electric EcoStruxure | 2025-10-14T07:00:00.000000Z | 2025-10-14T07:00:00.000000Z |
| icsa-25-259-01 | Schneider Electric Altivar products ATVdPAC module ILC992 InterLink Converter (Update A) | 2025-09-09T04:00:00.000000Z | 2025-10-14T07:00:00.000000Z |
| icsa-25-140-08 | Schneider Electric Modicon Controllers (Update B) | 2025-05-13T04:00:00.000000Z | 2025-10-14T07:00:00.000000Z |
| icsa-24-352-04 | Schneider Electric Modicon | 2024-12-10T05:00:00.000000Z | 2025-10-14T07:00:00.000000Z |
| icsa-25-287-01 | Rockwell Automation 1715 EtherNet/IP Comms Module | 2025-10-14T06:00:00.000000Z | 2025-10-14T06:00:00.000000Z |
| icsa-25-294-04 | Siemens RUGGEDCOM ROS Devices | 2025-07-08T00:00:00.000000Z | 2025-10-14T00:00:00.000000Z |
| icsa-25-294-03 | Siemens SIMATIC S7-1200 CPU V1/V2 Devices | 2011-06-10T00:00:00.000000Z | 2025-10-14T00:00:00.000000Z |
| icsa-25-289-09 | Siemens TeleControl Server Basic | 2025-10-14T00:00:00.000000Z | 2025-10-14T00:00:00.000000Z |
| icsa-25-289-08 | Siemens SINEC NMS | 2025-10-14T00:00:00.000000Z | 2025-10-14T00:00:00.000000Z |
| icsa-25-289-07 | Siemens SIMATIC ET 200SP Communication Processors | 2025-10-14T00:00:00.000000Z | 2025-10-14T00:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-cmm-info-disc-9ZEMAhGA | Cisco Meeting Management Information Disclosure Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-ccmp-sxss-qbtdbzdd | Cisco Unified Contact Center Management Portal Stored Cross-Site Scripting Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-ccmp-sxss-qBTDBZDD | Cisco Unified Contact Center Management Portal Stored Cross-Site Scripting Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-backhaul-ap-cmdinj-r7e28ecs | Cisco Unified Industrial Wireless Software for Ultra-Reliable Wireless Backhaul Access Point Command Injection Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-backhaul-ap-cmdinj-R7E28Ecs | Cisco Unified Industrial Wireless Software for Ultra-Reliable Wireless Backhaul Access Point Command Injection Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-3550-acl-bypass-mhskzc2q | Cisco Nexus 3550-F Switches Access Control List Programming Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-3550-acl-bypass-mhskZc2q | Cisco Nexus 3550-F Switches Access Control List Programming Vulnerability | 2024-11-06T16:00:00+00:00 | 2024-11-06T16:00:00+00:00 |
| cisco-sa-asaftd-acl-bypass-vvnlnkqf | Cisco Adaptive Security Appliance and Firepower Threat Defense Software AnyConnect Access Control List Bypass Vulnerabilities | 2024-10-23T16:00:00+00:00 | 2024-10-24T21:19:17+00:00 |
| cisco-sa-asaftd-acl-bypass-VvnLNKqf | Cisco Adaptive Security Appliance and Firepower Threat Defense Software AnyConnect Access Control List Bypass Vulnerabilities | 2024-10-23T16:00:00+00:00 | 2024-10-24T21:19:17+00:00 |
| cisco-sa-fmc-xss-infodisc-rl4mjfer | Cisco Secure Firewall Management Center Software Cross-Site Scripting and Information Disclosure Vulnerabilities | 2024-10-23T16:00:00+00:00 | 2024-10-24T11:52:38+00:00 |
| cisco-sa-ata19x-multi-rdteqrsy | Cisco ATA 190 Series Analog Telephone Adapter Firmware Vulnerabilities | 2024-10-16T16:00:00+00:00 | 2024-10-24T11:47:37+00:00 |
| cisco-sa-ata19x-multi-RDTEqRsy | Cisco ATA 190 Series Analog Telephone Adapter Firmware Vulnerabilities | 2024-10-16T16:00:00+00:00 | 2024-10-24T11:47:37+00:00 |
| cisco-sa-snort-rf-bypass-OY8f3pnM | Multiple Cisco Products Snort Rate Filter Bypass Vulnerability | 2024-10-23T16:00:00+00:00 | 2025-01-13T16:44:31+00:00 |
| cisco-sa-snort-bypass-ptry37fx | Cisco Firepower Threat Defense Software TCP Snort 3 Detection Engine Bypass Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-snort-bypass-PTry37fX | Cisco Firepower Threat Defense Software TCP Snort 3 Detection Engine Bypass Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-sa-ftd-snort-fw-bcjtzpmu | Cisco Firepower Threat Defense Software and Cisco FirePOWER Services TCP/IP Traffic with Snort 2 and Snort 3 Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-sa-ftd-snort-fw-BCJTZPMu | Cisco Firepower Threat Defense Software and Cisco FirePOWER Services TCP/IP Traffic with Snort 2 and Snort 3 Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-ftd2100-snort-dos-m9humt75 | Cisco Firepower Threat Defense Software for Cisco Firepower 2100 Series Appliances TCP UDP Snort 2 and Snort 3 Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-ftd2100-snort-dos-M9HuMt75 | Cisco Firepower Threat Defense Software for Cisco Firepower 2100 Series Appliances TCP UDP Snort 2 and Snort 3 Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-ftd-vdb-snort-djj4cnbr | Cisco Firepower Threat Defense Software Vulnerability Database with Snort Detection Engine Security Policy Bypass and Denial of Service Issue | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-ftd-vdb-snort-djj4cnbR | Cisco Firepower Threat Defense Software Vulnerability Database with Snort Detection Engine Security Policy Bypass and Denial of Service Issue | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-ftd-tls-dos-qxye5ufy | Cisco Firepower Threat Defense Software for Firepower 2100 Series TLS Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-ftd-tls-dos-QXYE5Ufy | Cisco Firepower Threat Defense Software for Firepower 2100 Series TLS Denial of Service Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-ftd-statcred-dfc8txt5 | Cisco Firepower Threat Defense Software for Firepower 1000, 2100, 3100, and 4200 Series Static Credential Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-ftd-statcred-dFC8tXT5 | Cisco Firepower Threat Defense Software for Firepower 1000, 2100, 3100, and 4200 Series Static Credential Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-ftd-geoip-bypass-mb4zrdu | Cisco Firepower Threat Defense Software Geolocation ACL Bypass Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-ftd-geoip-bypass-MB4zRDu | Cisco Firepower Threat Defense Software Geolocation ACL Bypass Vulnerability | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-fmc-xss-infodisc-RL4mJFer | Cisco Secure Firewall Management Center Software Cross-Site Scripting and Information Disclosure Vulnerabilities | 2024-10-23T16:00:00+00:00 | 2024-10-24T11:52:38+00:00 |
| cisco-sa-fmc-xss-dhjxqyzs | Cisco Secure Firewall Management Center Software Cross-Site Scripting Vulnerabilities | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| cisco-sa-fmc-xss-dhJxQYZs | Cisco Secure Firewall Management Center Software Cross-Site Scripting Vulnerabilities | 2024-10-23T16:00:00+00:00 | 2024-10-23T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2024-41067 | btrfs: scrub: handle RST lookup error correctly | 2024-07-01T07:00:00.000Z | 2026-03-04T14:43:30.000Z |
| msrc_cve-2025-40158 | ipv6: use RCU in ip6_output() | 2025-11-02T00:00:00.000Z | 2026-03-04T14:43:29.000Z |
| msrc_cve-2024-49885 | mm, slub: avoid zeroing kmalloc redzone | 2024-10-01T07:00:00.000Z | 2026-03-04T14:43:28.000Z |
| msrc_cve-2025-22115 | btrfs: fix block group refcount race in btrfs_create_pending_block_groups() | 2025-04-02T00:00:00.000Z | 2026-03-04T14:43:23.000Z |
| msrc_cve-2025-40170 | net: use dst_dev_rcu() in sk_setup_caps() | 2025-11-02T00:00:00.000Z | 2026-03-04T14:43:22.000Z |
| msrc_cve-2024-49940 | l2tp: prevent possible tunnel refcount underflow | 2024-10-01T07:00:00.000Z | 2026-03-04T14:43:20.000Z |
| msrc_cve-2025-21885 | RDMA/bnxt_re: Fix the page details for the srq created by kernel consumers | 2025-03-02T00:00:00.000Z | 2026-03-04T14:43:16.000Z |
| msrc_cve-2025-40168 | smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match(). | 2025-11-02T00:00:00.000Z | 2026-03-04T14:43:15.000Z |
| msrc_cve-2024-49932 | btrfs: don't readahead the relocation inode on RST | 2024-10-01T07:00:00.000Z | 2026-03-04T14:43:13.000Z |
| msrc_cve-2024-57804 | scsi: mpi3mr: Fix corrupt config pages PHY state is switched in sysfs | 2025-01-02T00:00:00.000Z | 2026-03-04T14:43:10.000Z |
| msrc_cve-2025-40146 | blk-mq: fix potential deadlock while nr_requests grown | 2025-11-02T00:00:00.000Z | 2026-03-04T14:43:08.000Z |
| msrc_cve-2025-21892 | RDMA/mlx5: Fix the recovery flow of the UMR QP | 2025-03-02T00:00:00.000Z | 2026-03-04T14:43:04.000Z |
| msrc_cve-2025-40139 | smc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set(). | 2025-11-02T00:00:00.000Z | 2026-03-04T14:43:02.000Z |
| msrc_cve-2024-49888 | bpf: Fix a sdiv overflow issue | 2024-10-01T07:00:00.000Z | 2026-03-04T14:43:02.000Z |
| msrc_cve-2024-35794 | dm-raid: really frozen sync_thread during suspend | 2024-05-02T07:00:00.000Z | 2026-03-04T14:42:58.000Z |
| msrc_cve-2025-40135 | ipv6: use RCU in ip6_xmit() | 2025-11-02T00:00:00.000Z | 2026-03-04T14:42:55.000Z |
| msrc_cve-2025-21732 | RDMA/mlx5: Fix a race for an ODP MR which leads to CQE with error | 2025-02-02T00:00:00.000Z | 2026-03-04T14:42:51.000Z |
| msrc_cve-2024-41932 | sched: fix warning in sched_setaffinity | 2025-01-02T00:00:00.000Z | 2026-03-04T14:42:45.000Z |
| msrc_cve-2025-37750 | smb: client: fix UAF in decryption with multichannel | 2025-05-02T00:00:00.000Z | 2026-03-04T14:42:39.000Z |
| msrc_cve-2024-56591 | Bluetooth: hci_conn: Use disable_delayed_work_sync | 2024-12-02T00:00:00.000Z | 2026-03-04T14:42:37.000Z |
| msrc_cve-2025-37747 | perf: Fix hang while freeing sigtrap event | 2025-05-02T00:00:00.000Z | 2026-03-04T14:42:32.000Z |
| msrc_cve-2024-57976 | btrfs: do proper folio cleanup when cow_file_range() failed | 2025-02-02T00:00:00.000Z | 2026-03-04T14:42:29.000Z |
| msrc_cve-2024-49971 | drm/amd/display: Increase array size of dummy_boolean | 2024-10-01T07:00:00.000Z | 2026-03-04T14:42:27.000Z |
| msrc_cve-2025-23135 | RISC-V: KVM: Teardown riscv specific bits after kvm_exit | 2025-04-02T00:00:00.000Z | 2026-03-04T14:42:25.000Z |
| msrc_cve-2025-37826 | scsi: ufs: core: Add NULL check in ufshcd_mcq_compl_pending_transfer() | 2025-05-02T00:00:00.000Z | 2026-03-04T14:42:22.000Z |
| msrc_cve-2024-49945 | net/ncsi: Disable the ncsi work before freeing the associated structure | 2024-10-01T07:00:00.000Z | 2026-03-04T14:42:20.000Z |
| msrc_cve-2025-22124 | md/md-bitmap: fix wrong bitmap_limit for clustermd when write sb | 2025-04-02T00:00:00.000Z | 2026-03-04T14:42:17.000Z |
| msrc_cve-2025-37877 | iommu: Clear iommu-dma ops on cleanup | 2025-05-02T00:00:00.000Z | 2026-03-04T14:42:14.000Z |
| msrc_cve-2024-49972 | drm/amd/display: Deallocate DML memory if allocation fails | 2024-10-01T07:00:00.000Z | 2026-03-04T14:42:13.000Z |
| msrc_cve-2025-21907 | mm: memory-failure: update ttu flag inside unmap_poisoned_folio | 2025-04-02T00:00:00.000Z | 2026-03-04T14:42:09.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2025-0235 | Kwetsbaarheden verholpen in Firefox en Thunderbird | 2025-07-23T13:01:45.118883Z | 2025-07-23T13:01:45.118883Z |
| ncsc-2025-0204 | Kwetsbaarheden verholpen in Cisco ISE en ISE-PIC | 2025-06-26T09:02:07.224036Z | 2025-07-23T07:46:25.364521Z |
| ncsc-2025-0215 | Kwetsbaarheden verholpen in Microsoft Office | 2025-07-08T18:24:48.517158Z | 2025-07-19T11:40:27.812820Z |
| ncsc-2025-0232 | Kwetsbaarheid verholpen in Keycloak | 2025-07-18T13:12:14.074394Z | 2025-07-18T13:12:14.074394Z |
| ncsc-2025-0196 | Kwetsbaarheden verholpen in Citrix NetScaler ADC en NetScaler Gateway | 2025-06-18T08:32:32.792202Z | 2025-07-18T09:51:52.738778Z |
| ncsc-2025-0231 | Kwetsbaarheden verholpen in XWiki | 2025-07-17T12:35:48.998487Z | 2025-07-17T12:35:48.998487Z |
| ncsc-2025-0230 | Kwetsbaarheid verholpen in Wing FTP Server | 2025-07-14T06:06:24.154078Z | 2025-07-14T06:06:24.154078Z |
| ncsc-2025-0226 | Kwetsbaarheid verholpen in FortiWeb | 2025-07-11T09:57:23.588152Z | 2025-07-11T13:20:55.101692Z |
| ncsc-2025-0229 | Kwetsbaarheden verholpen in Adobe InDesign Desktop | 2025-07-11T10:01:48.229418Z | 2025-07-11T10:01:48.229418Z |
| ncsc-2025-0228 | Kwetsbaarheden verholpen in Zoom Clients | 2025-07-11T09:58:21.871103Z | 2025-07-11T09:58:21.871103Z |
| ncsc-2025-0227 | Kwetsbaarheid verholpen in Juniper SRX300 Series | 2025-07-11T09:57:40.476096Z | 2025-07-11T09:57:40.476096Z |
| ncsc-2025-0225 | Kwetsbaarheid verholpen in Juniper Networks Security Director | 2025-07-11T09:55:46.934253Z | 2025-07-11T09:55:46.934253Z |
| ncsc-2025-0224 | Kwetsbaarheden verholpen in Adobe Illustrator | 2025-07-09T08:57:08.548822Z | 2025-07-09T08:57:08.548822Z |
| ncsc-2025-0223 | Kwetsbaarheden verholpen in Adobe Framemaker | 2025-07-09T08:47:38.891072Z | 2025-07-09T08:47:38.891072Z |
| ncsc-2025-0222 | Kwetsbaarheden verholpen in Adobe ColdFusion | 2025-07-09T08:41:53.656736Z | 2025-07-09T08:41:53.656736Z |
| ncsc-2025-0221 | Kwetsbaarheden verholpen in Schneider Electric EcoStruxture IT Datacenter Expert | 2025-07-09T08:38:05.336146Z | 2025-07-09T08:38:05.336146Z |
| ncsc-2025-0220 | Kwetsbaarheden verholpen in Palo Alto PAN-OS | 2025-07-09T08:33:14.284978Z | 2025-07-09T08:33:14.284978Z |
| ncsc-2025-0219 | Kwetsbaarheden verholpen in SAP producten | 2025-07-09T08:29:00.474865Z | 2025-07-09T08:29:00.474865Z |
| ncsc-2025-0218 | Kwetsbaarheden verholpen in Microsoft Edge (Chromium based) | 2025-07-08T18:26:55.812717Z | 2025-07-08T18:26:55.812717Z |
| ncsc-2025-0217 | Kwetsbaarheden verholpen in Microsoft Visual Studio | 2025-07-08T18:26:14.881161Z | 2025-07-08T18:26:14.881161Z |
| ncsc-2025-0216 | Kwetsbaarheden verholpen in Microsoft SQL Server | 2025-07-08T18:25:40.909948Z | 2025-07-08T18:25:40.909948Z |
| ncsc-2025-0214 | Kwetsbaarheden verholpen in Microsoft Azure | 2025-07-08T18:24:14.065296Z | 2025-07-08T18:24:14.065296Z |
| ncsc-2025-0213 | Kwetsbaarheden verholpen in Microsoft Windows | 2025-07-08T18:23:09.960791Z | 2025-07-08T18:23:09.960791Z |
| ncsc-2025-0212 | Kwetsbaarheden verholpen in Splunk Enterprise en Splunk Cloud Platform | 2025-07-08T12:03:17.100858Z | 2025-07-08T12:03:17.100858Z |
| ncsc-2025-0211 | Kwetsbaarheden verholpen in Siemens producten | 2025-07-08T11:58:23.712452Z | 2025-07-08T11:58:23.712452Z |
| ncsc-2025-0210 | Kwetsbaarheid verholpen in Cisco Unified Communications Manager | 2025-07-03T07:43:27.075341Z | 2025-07-03T07:43:27.075341Z |
| ncsc-2025-0209 | Kwetsbaarheid verholpen in Google Chrome | 2025-07-01T15:56:24.236216Z | 2025-07-01T15:56:24.236216Z |
| ncsc-2025-0208 | Kwetsbaarheden verholpen in Adobe Commerce | 2025-06-30T12:59:12.105658Z | 2025-06-30T12:59:12.105658Z |
| ncsc-2025-0207 | Kwetsbaarheden verholpen in Adobe InDesign Desktop | 2025-06-30T12:58:32.421661Z | 2025-06-30T12:58:32.421661Z |
| ncsc-2025-0206 | Kwetsbaarheden verholpen in Adobe Acrobat Reader | 2025-06-30T12:57:43.622242Z | 2025-06-30T12:57:43.622242Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10181-1 | sccache-0.13.0~1-2.1 on GA media | 2026-02-11T00:00:00Z | 2026-02-11T00:00:00Z |
| opensuse-su-2026:10180-1 | rustup-1.28.2~0-3.1 on GA media | 2026-02-11T00:00:00Z | 2026-02-11T00:00:00Z |
| opensuse-su-2026:10179-1 | python311-maturin-1.11.5-1.1 on GA media | 2026-02-11T00:00:00Z | 2026-02-11T00:00:00Z |
| opensuse-su-2026:10178-1 | libmunge2-0.5.18-1.1 on GA media | 2026-02-11T00:00:00Z | 2026-02-11T00:00:00Z |
| opensuse-su-2026:10177-1 | gnutls-3.8.12-1.1 on GA media | 2026-02-11T00:00:00Z | 2026-02-11T00:00:00Z |
| opensuse-su-2026:10176-1 | freerdp2-2.11.7-4.1 on GA media | 2026-02-11T00:00:00Z | 2026-02-11T00:00:00Z |
| opensuse-su-2026:10175-1 | cargo-audit-0.22.1~git0.efcde93-2.1 on GA media | 2026-02-11T00:00:00Z | 2026-02-11T00:00:00Z |
| opensuse-su-2026:10174-1 | assimp-devel-6.0.4-1.1 on GA media | 2026-02-11T00:00:00Z | 2026-02-11T00:00:00Z |
| opensuse-su-2026:10173-1 | apptainer-1.4.5-2.1 on GA media | 2026-02-11T00:00:00Z | 2026-02-11T00:00:00Z |
| opensuse-su-2026:20193-1 | Security update for orthanc, gdcm, orthanc-authorization, orthanc-dicomweb, orthanc-gdcm, orthanc-indexer, orthanc-mysql, orthanc-neuro, orthanc-postgresql, orthanc-python, orthanc-stl, orthanc-tcia, orthanc-wsi, python-pyorthanc | 2026-02-10T22:29:40Z | 2026-02-10T22:29:40Z |
| opensuse-su-2026:20191-1 | Security update for trivy | 2026-02-10T21:52:10Z | 2026-02-10T21:52:10Z |
| opensuse-su-2026:20192-1 | Security update for tailscale | 2026-02-10T21:45:05Z | 2026-02-10T21:45:05Z |
| opensuse-su-2026:10172-1 | wicked2nm-1.4.1-1.1 on GA media | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| opensuse-su-2026:10171-1 | lemon-3.51.2-1.1 on GA media | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| opensuse-su-2026:10170-1 | keylime-ima-policy-0.2.8+116-1.1 on GA media | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| opensuse-su-2026:10169-1 | libp11-kit0-0.26.2-1.1 on GA media | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| opensuse-su-2026:10168-1 | openQA-5.1770718745.ce2072d3-1.1 on GA media | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| opensuse-su-2026:10167-1 | libxml2-16-2.14.5-3.1 on GA media | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| opensuse-su-2026:10166-1 | libsoup-2_4-1-2.74.3-15.1 on GA media | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| opensuse-su-2026:10165-1 | keylime-config-7.14.0+0-1.1 on GA media | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| opensuse-su-2026:10164-1 | go1.25-1.25.7-1.1 on GA media | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| opensuse-su-2026:10163-1 | go1.24-1.24.13-1.1 on GA media | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| opensuse-su-2026:20183-1 | Security update for chromium | 2026-02-07T14:42:36Z | 2026-02-07T14:42:36Z |
| opensuse-su-2026:20184-1 | Security update for python-Django | 2026-02-07T13:45:17Z | 2026-02-07T13:45:17Z |
| opensuse-su-2026:10162-1 | localsearch-3.10.2-2.1 on GA media | 2026-02-07T00:00:00Z | 2026-02-07T00:00:00Z |
| opensuse-su-2026:20186-1 | Security update for libsoup | 2026-02-06T11:13:48Z | 2026-02-06T11:13:48Z |
| opensuse-su-2026:20185-1 | Security update for cockpit-packages | 2026-02-06T09:31:50Z | 2026-02-06T09:31:50Z |
| opensuse-su-2026:20182-1 | Security update for cockpit | 2026-02-06T03:08:03Z | 2026-02-06T03:08:03Z |
| opensuse-su-2026:20181-1 | Security update for cockpit-subscriptions | 2026-02-06T02:48:38Z | 2026-02-06T02:48:38Z |
| opensuse-su-2026:10161-1 | python311-azure-core-1.38.0-2.1 on GA media | 2026-02-06T00:00:00Z | 2026-02-06T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2025:1866 | Red Hat Security Advisory: RHODF-4.14-RHEL-9 security update | 2025-02-26T02:32:43+00:00 | 2026-03-18T11:25:54+00:00 |
| rhsa-2025:1865 | Red Hat Security Advisory: RHODF-4.15-RHEL-9 security update | 2025-02-26T00:59:33+00:00 | 2026-03-18T11:25:54+00:00 |
| rhsa-2025:1853 | Red Hat Security Advisory: RHTAS 1.1.1 - Red Hat Trusted Artifact Signer Release | 2025-02-25T16:07:56+00:00 | 2026-03-18T11:25:54+00:00 |
| rhsa-2025:1849 | Red Hat Security Advisory: RHTAS 1.1.1 - Red Hat Trusted Artifact Signer Release | 2025-02-25T15:47:48+00:00 | 2026-03-18T11:25:53+00:00 |
| rhsa-2025:1848 | Red Hat Security Advisory: RHTAS 1.1.1 - Red Hat Trusted Artifact Signer Release | 2025-02-25T15:47:37+00:00 | 2026-03-18T11:25:53+00:00 |
| rhsa-2025:1847 | Red Hat Security Advisory: RHTAS 1.1.1 - Red Hat Trusted Artifact Signer Release | 2025-02-25T15:45:17+00:00 | 2026-03-18T11:25:52+00:00 |
| rhsa-2025:1845 | Red Hat Security Advisory: RHTAS 1.1.1 - Red Hat Trusted Artifact Signer Release | 2025-02-25T15:43:03+00:00 | 2026-03-18T11:25:51+00:00 |
| rhsa-2025:1841 | Red Hat Security Advisory: RHTAS 1.1.1 - Red Hat Trusted Artifact Signer Release | 2025-02-25T15:38:58+00:00 | 2026-03-18T11:25:50+00:00 |
| rhsa-2025:1838 | Red Hat Security Advisory: OpenShift Virtualization 4.18.0 Images | 2025-02-25T15:12:43+00:00 | 2026-03-18T11:25:50+00:00 |
| rhsa-2025:1829 | Red Hat Security Advisory: RHODF-4.16-RHEL-9 security update | 2025-02-25T09:15:15+00:00 | 2026-03-18T11:25:50+00:00 |
| rhsa-2025:1824 | Red Hat Security Advisory: RHODF-4.17-RHEL-9 security update | 2025-02-25T07:50:02+00:00 | 2026-03-18T11:25:48+00:00 |
| rhsa-2025:17690 | Red Hat Security Advisory: OpenShift Container Platform 4.16.50 bug fix and security update | 2025-10-15T07:45:25+00:00 | 2026-03-18T11:25:47+00:00 |
| rhsa-2025:17657 | Red Hat Security Advisory: OpenShift Container Platform 4.18.26 bug fix and security update | 2025-10-15T14:07:50+00:00 | 2026-03-18T11:25:46+00:00 |
| rhsa-2025:17232 | Red Hat Security Advisory: OpenShift Container Platform 4.17.41 bug fix and security update | 2025-10-08T15:52:57+00:00 | 2026-03-18T11:25:46+00:00 |
| rhsa-2025:1711 | Red Hat Security Advisory: OpenShift Container Platform 4.15.46 bug fix and security update | 2025-02-27T04:27:12+00:00 | 2026-03-18T11:25:44+00:00 |
| rhsa-2025:1710 | Red Hat Security Advisory: OpenShift Container Platform 4.15.46 security and extras update | 2025-02-27T00:58:32+00:00 | 2026-03-18T11:25:43+00:00 |
| rhsa-2025:16483 | Red Hat Security Advisory: OpenShift Virtualization 4.12.20 Images | 2025-09-23T13:46:22+00:00 | 2026-03-18T11:25:43+00:00 |
| rhsa-2025:16165 | Red Hat Security Advisory: OpenShift Container Platform 4.14.57 bug fix and security update | 2025-09-25T04:42:04+00:00 | 2026-03-18T11:25:43+00:00 |
| rhsa-2025:1609 | Red Hat Security Advisory: Cluster Observability Operator 1.0.0 | 2025-02-17T16:13:51+00:00 | 2026-03-18T11:25:43+00:00 |
| rhsa-2025:16160 | Red Hat Security Advisory: OpenShift Container Platform 4.15.58 bug fix and security update | 2025-09-25T08:35:24+00:00 | 2026-03-18T11:25:42+00:00 |
| rhsa-2025:15847 | Red Hat Security Advisory: Red Hat OpenShift Dev Spaces 3.23.0 Release. | 2025-09-15T16:27:40+00:00 | 2026-03-18T11:25:41+00:00 |
| rhsa-2025:15680 | Red Hat Security Advisory: OpenShift Container Platform 4.16.48 bug fix and security update | 2025-09-17T11:15:03+00:00 | 2026-03-18T11:25:41+00:00 |
| rhsa-2025:15673 | Red Hat Security Advisory: OpenShift Container Platform 4.13.60 bug fix and security update | 2025-09-18T04:52:06+00:00 | 2026-03-18T11:25:41+00:00 |
| rhsa-2025:15332 | Red Hat Security Advisory: OpenShift Container Platform 4.12.80 bug fix and security update | 2025-09-11T10:37:17+00:00 | 2026-03-18T11:25:40+00:00 |
| rhsa-2025:1468 | Red Hat Security Advisory: ACS 4.4 enhancement and security update | 2025-02-13T18:14:31+00:00 | 2026-03-18T11:25:39+00:00 |
| rhsa-2025:1451 | Red Hat Security Advisory: OpenShift Container Platform 4.14.48 security update | 2025-02-19T23:10:54+00:00 | 2026-03-18T11:25:39+00:00 |
| rhsa-2025:1450 | Red Hat Security Advisory: OpenShift Container Platform 4.14.48 security and extras update | 2025-02-19T01:21:28+00:00 | 2026-03-18T11:25:39+00:00 |
| rhsa-2025:1448 | Red Hat Security Advisory: RHOAI 2.17.0 - Red Hat OpenShift AI | 2025-02-13T15:51:37+00:00 | 2026-03-18T11:25:39+00:00 |
| rhsa-2025:1386 | Red Hat Security Advisory: OpenShift Container Platform 4.16.35 security update | 2025-02-19T19:45:29+00:00 | 2026-03-18T11:25:39+00:00 |
| rhsa-2025:1334 | Red Hat Security Advisory: ACS 4.5 enhancement and security update | 2025-02-11T21:20:30+00:00 | 2026-03-18T11:25:39+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2020-042-01 | ProSoft Configurator for Modicon PMEPXM0100 (H) | 2020-02-11T00:00:00.000Z | 2020-02-11T00:00:00.000Z |
| sevd-2018-095-01 | Security Notification - U.motion Builder software | 2018-04-05T00:00:00.000Z | 2020-02-11T00:00:00.000Z |
| sevd-2020-014-01 | MSX Configurator | 2020-01-14T00:00:00.000Z | 2020-01-14T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-321292 | SSA-321292: Denial of Service in the OPC Foundation Local Discovery Server (LDS) in Industrial Products | 2022-05-10T00:00:00Z | 2024-10-08T00:00:00Z |
| ssa-254396 | SSA-254396: Vulnerability in Nozomi Guardian/CMC Before 24.3.1 on RUGGEDCOM APE1808 Devices | 2024-10-08T00:00:00Z | 2024-10-08T00:00:00Z |
| ssa-148641 | SSA-148641: XPath Constraint Vulnerability in Mendix Runtime | 2022-03-08T00:00:00Z | 2024-10-08T00:00:00Z |
| ssa-969738 | SSA-969738: Denial of Service Vulnerability in SIMATIC S7-200 SMART Devices | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-869574 | SSA-869574: Multiple Vulnerabilities in SINEMA Remote Connect Server Before V3.2 SP2 | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-792319 | SSA-792319: Missing Read Out Protection in SENTRON 7KM PAC3x20 Devices | 2024-03-12T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-765405 | SSA-765405: Multiple Vulnerabilities in SIMATIC RFID Readers | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-753746 | SSA-753746: Denial of Service Vulnerabilities in SIMATIC WinCC Affecting Other SIMATIC Software Products | 2024-02-13T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-721642 | SSA-721642: Injection Vulnerability in SCALANCE W700 802.11 AX Family Before V2.4 | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-566905 | SSA-566905: Multiple Denial of Service Vulnerabilities in the Webserver of Industrial Products | 2023-04-11T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-427715 | SSA-427715: Stack-Based Buffer Overflow Vulnerability in Tecnomatix Plant Simulation | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-423808 | SSA-423808: Multiple NULL Pointer Dereference Vulnerabilities in Industrial Products | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-417159 | SSA-417159: Multiple Vulnerabilities in SINEMA Remote Connect Client Before V3.2 SP2 | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-359713 | SSA-359713: Authorization Bypass Vulnerability in Industrial Edge Management | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-342438 | SSA-342438: Privilege Escalation Vulnerability in SINUMERIK ONE, SINUMERIK 840D and SINUMERIK 828D | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-293562 | SSA-293562: Denial of Service Vulnerabilities in PROFINET DCP Implementation of Industrial Products | 2017-05-08T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-280603 | SSA-280603: Denial of Service Vulnerability in SINUMERIK ONE and SINUMERIK MC | 2023-12-12T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-097786 | SSA-097786: Insertion of Sensitive Information into Log File Vulnerability in SINUMERIK systems | 2024-09-10T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-088132 | SSA-088132: Denial of Service Vulnerability in the OPC UA Server Implementations of Several Industrial Products | 2024-07-09T00:00:00Z | 2024-09-10T00:00:00Z |
| ssa-857368 | SSA-857368: Multiple Vulnerabilities in Omnivise T3000 | 2024-08-02T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-856475 | SSA-856475: X_T File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go | 2024-08-13T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-813746 | SSA-813746: BadAlloc Vulnerabilities in SCALANCE X-200, X-200IRT, and X-300 Switch Families | 2023-04-11T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-784301 | SSA-784301: Multiple Vulnerabilities in SINEC NMS Before V3.0 | 2024-08-13T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-771940 | SSA-771940: X_T File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go | 2024-06-11T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-722010 | SSA-722010: Datalogics File Parsing Vulnerability in Teamcenter Visualization and JT2Go | 2024-07-09T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-720392 | SSA-720392: Multiple Vulnerabilities in Third-Party Components in Location Intelligence Before V4.4 | 2024-08-13T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-716317 | SSA-716317: Multiple Vulnerability in SINEC Traffic Analyzer Before V2.0 | 2024-08-13T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-659443 | SSA-659443: Local Code Execution Vulnerabilities in COMOS Before V10.5 | 2024-08-13T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-640968 | SSA-640968: Untrusted Search Path Vulnerability in TIA Project-Server formerly known as TIA Multiuser Server | 2023-02-14T00:00:00Z | 2024-08-13T00:00:00Z |
| ssa-625850 | SSA-625850: Multiple WIBU Systems CodeMeter Vulnerabilities Affecting the Desigo CC Product Family and SENTRON powermanager | 2023-11-14T00:00:00Z | 2024-08-13T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:20470-1 | Security update for the Linux Kernel RT (Live Patch 10 for SUSE Linux Enterprise Micro 6.0) | 2026-02-19T09:19:11Z | 2026-02-19T09:19:11Z |
| suse-su-2026:20515-1 | Security update for the Linux Kernel RT (Live Patch 9 for SUSE Linux Enterprise Micro 6.0) | 2026-02-19T09:17:44Z | 2026-02-19T09:17:44Z |
| suse-su-2026:20514-1 | Security update for the Linux Kernel RT (Live Patch 8 for SUSE Linux Enterprise Micro 6.0) | 2026-02-19T09:17:44Z | 2026-02-19T09:17:44Z |
| suse-su-2026:20513-1 | Security update for the Linux Kernel RT (Live Patch 7 for SUSE Linux Enterprise Micro 6.0) | 2026-02-19T09:17:44Z | 2026-02-19T09:17:44Z |
| suse-su-2026:20512-1 | Security update for the Linux Kernel RT (Live Patch 6 for SUSE Linux Enterprise Micro 6.0) | 2026-02-19T09:17:44Z | 2026-02-19T09:17:44Z |
| suse-su-2026:20508-1 | Security update for the Linux Kernel (Live Patch 13 for SUSE Linux Enterprise Micro 6.0) | 2026-02-19T09:17:44Z | 2026-02-19T09:17:44Z |
| suse-su-2026:20507-1 | Security update for the Linux Kernel (Live Patch 12 for SUSE Linux Enterprise Micro 6.0) | 2026-02-19T09:17:44Z | 2026-02-19T09:17:44Z |
| suse-su-2026:20506-1 | Security update for the Linux Kernel (Live Patch 11 for SUSE Linux Enterprise Micro 6.0) | 2026-02-19T09:17:44Z | 2026-02-19T09:17:44Z |
| suse-su-2026:20505-1 | Security update for the Linux Kernel (Live Patch 10 for SUSE Linux Enterprise Micro 6.0) | 2026-02-19T09:17:44Z | 2026-02-19T09:17:44Z |
| suse-su-2026:20504-1 | Security update for the Linux Kernel (Live Patch 9 for SUSE Linux Enterprise Micro 6.0) | 2026-02-19T09:17:44Z | 2026-02-19T09:17:44Z |
| suse-su-2026:20503-1 | Security update for the Linux Kernel (Live Patch 8 for SUSE Linux Enterprise Micro 6.0) | 2026-02-19T09:17:44Z | 2026-02-19T09:17:44Z |
| suse-su-2026:20502-1 | Security update for the Linux Kernel (Live Patch 7 for SUSE Linux Enterprise Micro 6.0) | 2026-02-19T09:17:44Z | 2026-02-19T09:17:44Z |
| suse-su-2026:20501-1 | Security update for the Linux Kernel (Live Patch 6 for SUSE Linux Enterprise Micro 6.0) | 2026-02-19T09:17:44Z | 2026-02-19T09:17:44Z |
| suse-su-2026:20500-1 | Security update for the Linux Kernel (Live Patch 5 for SUSE Linux Enterprise Micro 6.0) | 2026-02-19T09:17:44Z | 2026-02-19T09:17:44Z |
| suse-su-2026:20499-1 | Security update for the Linux Kernel (Live Patch 4 for SUSE Linux Enterprise Micro 6.0) | 2026-02-19T09:17:44Z | 2026-02-19T09:17:44Z |
| suse-su-2026:20469-1 | Security update for the Linux Kernel (Live Patch 13 for SUSE Linux Enterprise Micro 6.0) | 2026-02-19T09:17:44Z | 2026-02-19T09:17:44Z |
| suse-su-2026:20468-1 | Security update for the Linux Kernel (Live Patch 12 for SUSE Linux Enterprise Micro 6.0) | 2026-02-19T09:17:44Z | 2026-02-19T09:17:44Z |
| suse-su-2026:20467-1 | Security update for the Linux Kernel (Live Patch 11 for SUSE Linux Enterprise Micro 6.0) | 2026-02-19T09:17:44Z | 2026-02-19T09:17:44Z |
| suse-su-2026:20466-1 | Security update for the Linux Kernel (Live Patch 10 for SUSE Linux Enterprise Micro 6.0) | 2026-02-19T09:17:44Z | 2026-02-19T09:17:44Z |
| suse-su-2026:20465-1 | Security update for the Linux Kernel (Live Patch 9 for SUSE Linux Enterprise Micro 6.0) | 2026-02-19T09:17:44Z | 2026-02-19T09:17:44Z |
| suse-su-2026:20464-1 | Security update for the Linux Kernel (Live Patch 8 for SUSE Linux Enterprise Micro 6.0) | 2026-02-19T09:17:44Z | 2026-02-19T09:17:44Z |
| suse-su-2026:20463-1 | Security update for the Linux Kernel (Live Patch 7 for SUSE Linux Enterprise Micro 6.0) | 2026-02-19T09:17:44Z | 2026-02-19T09:17:44Z |
| suse-su-2026:20462-1 | Security update for the Linux Kernel (Live Patch 6 for SUSE Linux Enterprise Micro 6.0) | 2026-02-19T09:17:44Z | 2026-02-19T09:17:44Z |
| suse-su-2026:20461-1 | Security update for the Linux Kernel (Live Patch 5 for SUSE Linux Enterprise Micro 6.0) | 2026-02-19T09:17:44Z | 2026-02-19T09:17:44Z |
| suse-su-2026:20460-1 | Security update for the Linux Kernel (Live Patch 4 for SUSE Linux Enterprise Micro 6.0) | 2026-02-19T09:17:44Z | 2026-02-19T09:17:44Z |
| suse-su-2026:20459-1 | Security update for the Linux Kernel RT (Live Patch 9 for SUSE Linux Enterprise Micro 6.0) | 2026-02-19T09:17:44Z | 2026-02-19T09:17:44Z |
| suse-su-2026:20458-1 | Security update for the Linux Kernel RT (Live Patch 8 for SUSE Linux Enterprise Micro 6.0) | 2026-02-19T09:17:44Z | 2026-02-19T09:17:44Z |
| suse-su-2026:20457-1 | Security update for the Linux Kernel RT (Live Patch 7 for SUSE Linux Enterprise Micro 6.0) | 2026-02-19T09:17:44Z | 2026-02-19T09:17:44Z |
| suse-su-2026:20456-1 | Security update for the Linux Kernel RT (Live Patch 6 for SUSE Linux Enterprise Micro 6.0) | 2026-02-19T09:17:44Z | 2026-02-19T09:17:44Z |
| suse-su-2026:20511-1 | Security update for the Linux Kernel RT (Live Patch 5 for SUSE Linux Enterprise Micro 6.0) | 2026-02-19T06:32:11Z | 2026-02-19T06:32:11Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2026:0238 | Important: libpng security update | 2026-01-07T00:00:00Z | 2026-01-07T21:36:21Z |
| alsa-2026:0241 | Important: libpng security update | 2026-01-07T00:00:00Z | 2026-01-07T21:34:12Z |
| alsa-2026:0125 | Important: mingw-libpng security update | 2026-01-06T00:00:00Z | 2026-01-07T21:32:21Z |
| alsa-2026:0128 | Moderate: poppler security update | 2026-01-06T00:00:00Z | 2026-01-07T14:29:22Z |
| alsa-2026:0130 | Moderate: poppler security update | 2026-01-06T00:00:00Z | 2026-01-07T14:26:34Z |
| alsa-2026:0137 | Important: mariadb security update | 2026-01-06T00:00:00Z | 2026-01-07T14:24:03Z |
| alsa-2026:0126 | Moderate: poppler security update | 2026-01-06T00:00:00Z | 2026-01-07T14:21:37Z |
| alsa-2026:0123 | Moderate: python3.12 security update | 2026-01-06T00:00:00Z | 2026-01-07T14:18:43Z |
| alsa-2026:0108 | Moderate: gcc-toolset-15-binutils security update | 2026-01-06T00:00:00Z | 2026-01-07T14:17:02Z |
| alsa-2025:14999 | Moderate: resource-agents security update | 2025-09-02T00:00:00Z | 2026-01-05T21:07:54Z |
| alsa-2025:19434 | Moderate: xorg-x11-server security update | 2025-11-03T00:00:00Z | 2026-01-05T21:05:53Z |
| alsa-2025:23062 | Moderate: ruby:3.3 security update | 2025-12-10T00:00:00Z | 2026-01-05T20:45:40Z |
| alsa-2025:23063 | Moderate: ruby:3.3 security update | 2025-12-10T00:00:00Z | 2026-01-05T20:38:49Z |
| alsa-2025:23141 | Moderate: ruby security update | 2025-12-11T00:00:00Z | 2026-01-05T20:34:29Z |
| alsa-2025:23241 | Important: kernel security update | 2025-12-16T00:00:00Z | 2026-01-05T20:29:24Z |
| alsa-2025:23279 | Important: kernel security update | 2025-12-16T00:00:00Z | 2026-01-05T20:25:38Z |
| alsa-2025:23919 | Important: httpd security update | 2025-12-22T00:00:00Z | 2026-01-05T20:20:59Z |
| alsa-2026:0052 | Moderate: gcc-toolset-14-binutils security update | 2026-01-05T00:00:00Z | 2026-01-05T20:18:34Z |
| alsa-2026:0026 | Important: thunderbird security update | 2026-01-05T00:00:00Z | 2026-01-05T10:18:14Z |
| alsa-2026:0025 | Important: thunderbird security update | 2026-01-05T00:00:00Z | 2026-01-05T10:10:00Z |
| alsa-2026:0002 | Moderate: tar security update | 2026-01-05T00:00:00Z | 2026-01-05T09:20:37Z |
| alsa-2025:23543 | Important: container-tools:rhel8 security update | 2025-12-17T00:00:00Z | 2025-12-24T09:25:49Z |
| alsa-2025:23856 | Important: thunderbird security update | 2025-12-22T00:00:00Z | 2025-12-23T16:45:01Z |
| alsa-2025:23948 | Moderate: grafana security update | 2025-12-22T00:00:00Z | 2025-12-23T13:42:03Z |
| alsa-2025:23664 | Important: opentelemetry-collector security update | 2025-12-18T00:00:00Z | 2025-12-23T13:09:37Z |
| alsa-2025:23729 | Important: opentelemetry-collector security update | 2025-12-21T00:00:00Z | 2025-12-23T13:07:45Z |
| alsa-2025:23932 | Important: httpd security update | 2025-12-22T00:00:00Z | 2025-12-23T06:01:50Z |
| alsa-2025:23940 | Moderate: python3.12 security update | 2025-12-22T00:00:00Z | 2025-12-23T05:59:49Z |
| alsa-2025:23382 | Moderate: binutils security update | 2025-12-16T00:00:00Z | 2025-12-22T14:14:14Z |
| alsa-2025:23383 | Moderate: curl security update | 2025-12-16T00:00:00Z | 2025-12-22T14:12:06Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2025-818 | Heap-buffer-overflow in std::__1::pair<int, arrow::util::RleBitPackedParser::ControlFlow> arrow::util::R | 2025-10-07T00:03:45.262747Z | 2025-10-10T14:38:33.479652Z |
| osv-2025-788 | Heap-buffer-overflow in int arrow::bit_util::BitReader::GetBatch<int> | 2025-09-28T00:00:36.076414Z | 2025-10-10T14:35:28.235525Z |
| osv-2025-827 | Global-buffer-overflow in void jxl::N_SSE4::WriteToOutputStage::StoreUnsignedRow<unsigned char> | 2025-10-10T00:09:16.816189Z | 2025-10-10T00:09:16.816846Z |
| osv-2025-825 | UNKNOWN WRITE in RescalerImportRowExpand_SSE2 | 2025-10-09T00:14:42.650822Z | 2025-10-09T00:14:42.651395Z |
| osv-2025-824 | Use-of-uninitialized-value in JS_DefineProperty | 2025-10-08T00:04:16.630040Z | 2025-10-08T00:04:16.630688Z |
| osv-2025-819 | Use-of-uninitialized-value in HasAlpha32b_SSE2 | 2025-10-07T00:04:07.544365Z | 2025-10-07T00:04:07.544831Z |
| osv-2025-809 | Use-of-uninitialized-value in WebPCleanupTransparentArea | 2025-10-05T00:04:29.576718Z | 2025-10-05T00:04:29.577250Z |
| osv-2025-808 | Use-of-uninitialized-value in WebPMultRow_C | 2025-10-04T00:07:11.139186Z | 2025-10-04T00:07:11.139704Z |
| osv-2025-803 | Global-buffer-overflow in icaltime_day_of_year | 2025-10-02T00:11:54.061581Z | 2025-10-02T00:11:54.061989Z |
| osv-2025-797 | Heap-buffer-overflow in ProcessRows | 2025-09-30T00:07:53.914184Z | 2025-09-30T00:07:53.914578Z |
| osv-2025-796 | Heap-buffer-overflow in AddGreenToBlueAndRed_AVX2 | 2025-09-30T00:07:08.673173Z | 2025-09-30T00:07:08.673608Z |
| osv-2025-793 | Heap-use-after-free in parse_from_header | 2025-09-29T00:08:32.876425Z | 2025-09-29T00:08:32.876798Z |
| osv-2024-370 | Heap-buffer-overflow in H5O__chunk_protect | 2024-04-30T00:08:00.120801Z | 2025-09-27T15:27:53.336806Z |
| osv-2025-787 | Heap-buffer-overflow in DwaCompressor_uncompress | 2025-09-27T00:18:30.312049Z | 2025-09-27T00:18:30.312655Z |
| osv-2022-795 | UNKNOWN READ in pcl::PLYReader::read | 2022-08-28T00:00:11.408403Z | 2025-09-26T14:12:06.751834Z |
| osv-2025-783 | Heap-buffer-overflow in inspect_process | 2025-09-26T00:06:21.859576Z | 2025-09-26T00:06:21.859964Z |
| osv-2025-262 | UNKNOWN WRITE in _lou_handlePassVariableAction | 2025-04-07T00:02:21.621602Z | 2025-09-25T14:33:42.888095Z |
| osv-2025-290 | Heap-buffer-overflow in pcpp::TelnetLayer::toString | 2025-04-19T00:05:45.140280Z | 2025-09-25T14:31:44.695948Z |
| osv-2024-86 | Security exception in org.threeten.bp.format.DateTimeFormatterBuilder$CompositePrinterParser.parse | 2024-02-09T00:00:11.154046Z | 2025-09-25T14:31:01.295253Z |
| osv-2024-171 | Security exception in org.threeten.bp.format.DateTimeFormatterBuilder$CompositePrinterParser.parse | 2024-03-15T00:08:01.855772Z | 2025-09-25T14:28:39.920838Z |
| osv-2024-184 | Security exception in org.threeten.bp.format.DateTimeFormatterBuilder$CompositePrinterParser.parse | 2024-03-21T00:13:27.175097Z | 2025-09-25T14:28:31.599671Z |
| osv-2018-6 | Use-of-uninitialized-value in DosSlashToUnix | 2021-01-13T00:00:02.571744Z | 2025-09-25T14:18:29.826514Z |
| osv-2018-204 | UNKNOWN WRITE in __msan_memcpy.part.51 | 2021-01-13T00:01:23.035709Z | 2025-09-25T14:18:29.315747Z |
| osv-2025-424 | UNKNOWN READ in RDKit::RDValue::destroy | 2025-06-03T00:12:35.236863Z | 2025-09-24T14:19:44.921114Z |
| osv-2025-447 | Use-of-uninitialized-value in spvtools::EmitNumericLiteral | 2025-06-09T00:05:11.128452Z | 2025-09-24T14:18:33.220549Z |
| osv-2025-767 | UNKNOWN READ in dcd_int_handler | 2025-09-20T00:19:20.851166Z | 2025-09-20T00:19:20.851464Z |
| osv-2025-766 | Heap-buffer-overflow in Open | 2025-09-20T00:18:10.380843Z | 2025-09-20T00:18:10.381141Z |
| osv-2025-765 | Security exception in com.spotify.docker.client.shaded.com.fasterxml.jackson.databind.util.TokenBuffer | 2025-09-20T00:18:07.994839Z | 2025-09-20T00:18:07.995257Z |
| osv-2025-764 | Global-buffer-overflow in Ogg_CreateES | 2025-09-20T00:15:54.584666Z | 2025-09-20T00:15:54.585041Z |
| osv-2025-762 | Use-of-uninitialized-value in fuzzer_send | 2025-09-19T00:14:45.258709Z | 2025-09-19T00:14:45.259063Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2022-0100 | Use After Free with `externref`s in Wasmtime | 2022-07-12T12:00:00Z | 2025-05-02T08:23:27Z |
| rustsec-2022-0099 | Use after free with `externref`s and epoch interruption in Wasmtime | 2022-03-28T12:00:00Z | 2025-05-02T08:23:27Z |
| rustsec-2022-0098 | Data leakage between instances in the pooling allocator | 2022-11-05T12:00:00Z | 2025-05-02T08:23:27Z |
| rustsec-2022-0097 | Out of bounds write in `wasmtime_trap_code` C API function | 2022-11-07T12:00:00Z | 2025-05-02T08:23:27Z |
| rustsec-2022-0095 | Miscompilation of `i8x16.swizzle` and `select` with v128 inputs | 2022-06-27T12:00:00Z | 2025-05-02T08:23:27Z |
| rustsec-2023-0089 | atomic-polyfill is unmaintained | 2023-07-11T12:00:00Z | 2025-04-29T08:31:10Z |
| rustsec-2025-0026 | registry is unmaintained | 2025-01-13T12:00:00Z | 2025-04-29T08:11:21Z |
| rustsec-2025-0025 | rustc-serialize is unmaintained | 2025-04-28T12:00:00Z | 2025-04-28T13:38:14Z |
| rustsec-2022-0044 | `markdown` (1.0.0 and higher) is maintained | 2022-01-17T12:00:00Z | 2025-04-28T10:35:27Z |
| rustsec-2025-0021 | SHA-1 collision attacks are not detected | 2025-04-03T12:00:00Z | 2025-04-08T07:10:04Z |
| rustsec-2025-0017 | The `trust-dns` project has been rebranded to `hickory-dns` | 2025-03-23T12:00:00Z | 2025-03-23T07:00:21Z |
| rustsec-2025-0014 | humantime is unmaintained | 2025-03-08T12:00:00Z | 2025-03-13T00:41:50Z |
| rustsec-2025-0013 | resolve is unmaintained | 2025-02-21T12:00:00Z | 2025-03-07T15:52:15Z |
| rustsec-2025-0011 | `openpgp-card-sequoia` is unmaintained. | 2025-03-04T12:00:00Z | 2025-03-07T15:47:21Z |
| rustsec-2025-0010 | Versions of *ring* prior to 0.17 are unmaintained. | 2025-03-05T12:00:00Z | 2025-03-07T15:46:47Z |
| rustsec-2025-0007 | *ring* is unmaintained | 2025-02-20T12:00:00Z | 2025-03-06T21:16:59Z |
| rustsec-2021-0087 | columnar: `Read` on uninitialized buffer may cause UB (ColumnarReadExt::read_typed_vec()) | 2021-01-07T12:00:00Z | 2025-02-01T00:07:11Z |
| rustsec-2025-0001 | gix-worktree-state nonexclusive checkout sets executable files world-writable | 2025-01-18T12:00:00Z | 2025-01-22T17:11:51Z |
| rustsec-2024-0434 | Missing facility to signal rotation of a verified cryptographic identity | 2024-01-07T12:00:00Z | 2025-01-22T10:27:39Z |
| rustsec-2024-0359 | The kstring integration in gix-attributes is unsound | 2024-07-24T12:00:00Z | 2025-01-19T00:36:24Z |
| rustsec-2024-0433 | Malicious plugin names, recipients, or identities can cause arbitrary binary execution | 2024-12-18T12:00:00Z | 2025-01-03T18:23:54Z |
| rustsec-2024-0432 | Malicious plugin names, recipients, or identities can cause arbitrary binary execution | 2024-12-18T12:00:00Z | 2025-01-03T18:23:54Z |
| rustsec-2024-0427 | get-size-derive is unmaintained | 2024-09-15T12:00:00Z | 2024-12-22T09:01:06Z |
| rustsec-2024-0425 | get-size is unmaintained | 2024-09-15T12:00:00Z | 2024-12-22T09:01:06Z |
| rustsec-2024-0423 | gtk-layer-shell-sys GTK3 bindings - no longer maintained | 2024-12-09T12:00:00Z | 2024-12-09T13:12:34Z |
| rustsec-2024-0422 | gtk-layer-shell GTK3 bindings - no longer maintained | 2024-12-09T12:00:00Z | 2024-12-09T13:12:34Z |
| rustsec-2024-0420 | gtk-rs GTK3 bindings - no longer maintained | 2024-03-04T12:00:00Z | 2024-12-09T12:29:00Z |
| rustsec-2024-0419 | gtk-rs GTK3 bindings - no longer maintained | 2024-03-04T12:00:00Z | 2024-12-09T12:29:00Z |
| rustsec-2024-0418 | gtk-rs GTK3 bindings - no longer maintained | 2024-03-04T12:00:00Z | 2024-12-09T12:29:00Z |
| rustsec-2024-0417 | gtk-rs GTK3 bindings - no longer maintained | 2024-03-04T12:00:00Z | 2024-12-09T12:29:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-libpython-2022-45061 | 2025-08-11T13:52:09.011Z | 2026-02-11T09:09:18.507Z | |
| bit-libphp-2022-4900 | Potential buffer overflow in php_cli_server_startup_workers | 2025-08-11T13:53:48.387Z | 2026-02-11T09:09:18.507Z |
| bit-keydb-2025-21605 | Redis DoS Vulnerability due to unlimited growth of output buffers abused by unauthenticated client | 2025-04-25T07:14:30.296Z | 2026-02-11T09:09:18.507Z |
| bit-keydb-2024-51741 | Redis allows denial-of-service due to malformed ACL selectors | 2025-01-08T07:13:13.917Z | 2026-02-11T09:09:18.507Z |
| bit-keydb-2024-46981 | Redis' Lua library commands may lead to remote code execution | 2025-01-08T07:13:21.212Z | 2026-02-11T09:09:18.507Z |
| bit-jenkins-2023-44487 | 2024-03-06T10:54:03.578Z | 2026-02-11T09:09:18.507Z | |
| bit-grafana-2024-10452 | 2024-10-31T07:09:47.399Z | 2026-02-11T09:09:18.507Z | |
| bit-golang-2025-68121 | Unexpected session resumption in crypto/tls | 2026-02-10T10:05:16.474Z | 2026-02-11T09:09:18.507Z |
| bit-golang-2023-44487 | 2024-03-06T10:53:14.274Z | 2026-02-11T09:09:18.507Z | |
| bit-envoy-2023-44487 | 2024-03-06T10:52:27.702Z | 2026-02-11T09:09:18.507Z | |
| bit-dotnet-2023-44487 | 2024-03-06T10:52:07.879Z | 2026-02-11T09:09:18.507Z | |
| bit-django-2024-27351 | 2024-07-02T07:16:49.319Z | 2026-02-11T09:09:18.507Z | |
| bit-contour-2023-44487 | 2024-03-06T10:50:58.800Z | 2026-02-11T09:09:18.507Z | |
| bit-apisix-2023-44487 | 2024-03-06T10:50:34.863Z | 2026-02-11T09:09:18.507Z | |
| bit-apache-2023-27522 | Apache HTTP Server: mod_proxy_uwsgi HTTP response splitting | 2024-03-06T10:51:05.888Z | 2026-02-11T09:09:18.507Z |
| bit-nginx-2026-1642 | 2026-02-10T18:00:00.000Z | 2026-02-10T18:00:00.000Z | |
| bit-prestashop-2026-25597 | PrestaShop has a time based enumeration in FO login form | 2026-02-10T10:02:58.336Z | 2026-02-10T10:34:11.934Z |
| bit-golang-2025-61732 | Potential code smuggling via doc comments in cmd/cgo | 2026-02-10T08:48:31.170Z | 2026-02-10T09:16:50.296Z |
| bit-discourse-2025-67723 | Discourse vulnerable to stored Cross-site Scripting via Katex in discourse-math plugin | 2026-02-02T08:42:10.509Z | 2026-02-10T09:16:50.296Z |
| bit-checkov-2021-3040 | Bridgecrew Checkov: Unsafe deserialization of Terraform files allows code execution | 2026-02-09T11:36:28.864Z | 2026-02-09T12:10:11.303Z |
| bit-checkov-2021-3035 | Bridgecrew Checkov: Unsafe deserialization of Terraform files allows code execution | 2026-02-09T11:36:27.254Z | 2026-02-09T12:10:11.303Z |
| bit-mastodon-2026-25540 | Mastodon's signature-dependent ActivityPub collection responses cached under signature-independent keys (Web Cache Poisoning via `Rails.cache`) | 2026-02-06T08:46:33.665Z | 2026-02-06T09:20:48.186Z |
| bit-golang-2025-22873 | Improper access to parent directory of root in os | 2026-02-06T08:45:38.334Z | 2026-02-06T09:20:48.186Z |
| bit-valkey-2025-32023 | Redis allows out of bounds writes in hyperloglog commands leading to RCE | 2025-10-16T12:07:58.321Z | 2026-02-05T09:10:30.960Z |
| bit-redis-2025-32023 | Redis allows out of bounds writes in hyperloglog commands leading to RCE | 2025-10-16T12:06:41.782Z | 2026-02-05T09:10:30.960Z |
| bit-keydb-2025-32023 | Redis allows out of bounds writes in hyperloglog commands leading to RCE | 2025-10-16T12:00:41.031Z | 2026-02-05T09:10:30.960Z |
| bit-gitlab-2026-1751 | Missing Authorization in GitLab | 2026-02-05T09:09:05.467Z | 2026-02-05T09:10:30.960Z |
| bit-django-2026-1312 | Potential SQL injection via QuerySet.order_by and FilteredRelation | 2026-02-05T08:38:43.002Z | 2026-02-05T09:10:30.960Z |
| bit-django-2026-1287 | Potential SQL injection in column aliases via control characters | 2026-02-05T08:38:41.246Z | 2026-02-05T09:10:30.960Z |
| bit-django-2026-1285 | Potential denial-of-service vulnerability in django.utils.text.Truncator HTML methods | 2026-02-05T08:38:39.228Z | 2026-02-05T09:10:30.960Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-mu17611 | tar | 2026-01-30T15:13:23.048582Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ml51665 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:20:55.711028Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-mj64494 | Redis is an open source, in-memory database that persists on disk | 2026-01-30T13:59:20.370058Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-mj51212 | Cancelling a query (e | 2026-01-30T15:40:23.782215Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-mi26039 | Within HostnameError | 2026-01-30T14:49:22.768843Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-mf93723 | Within HostnameError | 2026-01-30T16:03:24.521286Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-me47927 | net/http package improperly accepts a bare LF as a line terminator in chunked data chunk-size lines | 2026-01-30T15:43:24.066833Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-mb75553 | vulnerability was found in Avahi, where a reachable assertion exists in avahi_dns_packet_append_record | 2026-01-30T16:26:25.443727Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ma27248 | Cancelling a query (e | 2026-01-30T16:28:55.356497Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-lz10721 | Within HostnameError | 2026-01-30T16:40:55.517816Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ly33846 | Within HostnameError | 2026-01-30T15:16:23.051630Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-lp38773 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:03:53.100242Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ll43287 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:50:54.603931Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ld23143 | Cancelling a query (e | 2026-01-30T14:52:52.766441Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-la33013 | Within HostnameError | 2026-01-30T14:40:22.526589Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-la13761 | vulnerability in the OLE2 file format parser of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device | 2026-01-30T14:05:50.594365Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-kz63902 | tar | 2026-01-30T14:41:22.559595Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-kz60560 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T16:19:55.200542Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-kz30232 | Go before 1 | 2026-01-30T16:39:25.872575Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-kv78041 | processing time for parsing some invalid inputs scales non-linearly with respect to the size of the input | 2026-01-30T14:56:23.125184Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ku65968 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T16:15:25.445497Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-kq33111 | Cancelling a query (e | 2026-01-30T15:02:22.834896Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-kk41938 | Within HostnameError | 2026-01-30T15:06:23.375949Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-kg18353 | Within HostnameError | 2026-01-30T14:02:50.542288Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-kf66928 | Within HostnameError | 2026-01-30T14:53:23.030035Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-kd20596 | Cancelling a query (e | 2026-01-30T16:28:55.316811Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-kc06686 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:10:53.141957Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-kc01126 | tar | 2026-01-30T14:48:22.721160Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ka40024 | PostgreSQL optimizer statistics allow a user to read sampled data within a view that the user cannot access | 2026-01-30T17:03:56.468881Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-jx46109 | Within HostnameError | 2026-01-30T17:25:26.548568Z | 2026-01-29T18:58:54Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2017-ALE-019 | Vulnérabilité d'usurpation d'identité dans plusieurs clients de messagerie | 2017-12-05T00:00:00.000000 | 2018-03-07T00:00:00.000000 |
| certfr-2018-ale-003 | Vulnérabilité dans Adobe Flash Player | 2018-02-02T00:00:00.000000 | 2018-02-07T00:00:00.000000 |
| CERTFR-2018-ALE-003 | Vulnérabilité dans Adobe Flash Player | 2018-02-02T00:00:00.000000 | 2018-02-07T00:00:00.000000 |
| certfr-2017-ale-017 | Vulnérabilité dans le serveur de messagerie Exim | 2017-11-27T00:00:00.000000 | 2018-02-01T00:00:00.000000 |
| CERTFR-2017-ALE-017 | Vulnérabilité dans le serveur de messagerie Exim | 2017-11-27T00:00:00.000000 | 2018-02-01T00:00:00.000000 |
| certfr-2017-ale-018 | Vulnérabilité dans Apple MacOS High Sierra | 2017-11-29T00:00:00.000000 | 2017-11-30T00:00:00.000000 |
| CERTFR-2017-ALE-018 | Vulnérabilité dans Apple MacOS High Sierra | 2017-11-29T00:00:00.000000 | 2017-11-30T00:00:00.000000 |
| certfr-2017-ale-016 | Campagne de rançongiciel Bad Rabbit | 2017-10-25T00:00:00.000000 | 2017-10-27T00:00:00.000000 |
| CERTFR-2017-ALE-016 | Campagne de rançongiciel Bad Rabbit | 2017-10-25T00:00:00.000000 | 2017-10-27T00:00:00.000000 |
| certfr-2017-ale-014 | Vulnérabilité dans le protocole WPA/WPA2 | 2017-10-18T00:00:00.000000 | 2017-10-19T00:00:00.000000 |
| CERTFR-2017-ALE-014 | Vulnérabilité dans le protocole WPA/WPA2 | 2017-10-18T00:00:00.000000 | 2017-10-19T00:00:00.000000 |
| certfr-2017-ale-015 | Vulnérabilités dans la bibliothèque Infineon RSA | 2017-10-16T00:00:00.000000 | 2017-10-17T00:00:00.000000 |
| CERTFR-2017-ALE-015 | Vulnérabilités dans la bibliothèque Infineon RSA | 2017-10-16T00:00:00.000000 | 2017-10-17T00:00:00.000000 |
| certfr-2017-ale-013 | Présence de code malveillant dans Piriform CCleaner | 2017-09-18T00:00:00.000000 | 2017-10-09T00:00:00.000000 |
| CERTFR-2017-ALE-013 | Présence de code malveillant dans Piriform CCleaner | 2017-09-18T00:00:00.000000 | 2017-10-09T00:00:00.000000 |
| certfr-2017-ale-008 | Multiples vulnérabilités dans Microsoft Windows XP et Windows Server 2003 | 2017-04-14T00:00:00.000000 | 2017-09-06T00:00:00.000000 |
| CERTFR-2017-ALE-008 | Multiples vulnérabilités dans Microsoft Windows XP et Windows Server 2003 | 2017-04-14T00:00:00.000000 | 2017-09-06T00:00:00.000000 |
| certfr-2017-ale-012 | Campagne de maliciels prenant l'apparence d'un rançongiciel à multiples capacités de propagation | 2017-06-27T00:00:00.000000 | 2017-08-03T00:00:00.000000 |
| CERTFR-2017-ALE-012 | Campagne de maliciels prenant l'apparence d'un rançongiciel à multiples capacités de propagation | 2017-06-27T00:00:00.000000 | 2017-08-03T00:00:00.000000 |
| certfr-2017-ale-011 | Campagne de messages électroniques non sollicités de type Jaff | 2017-05-14T00:00:00.000000 | 2017-06-27T00:00:00.000000 |
| certfr-2017-ale-010 | Propagation d'un rançongiciel exploitant les vulnérabilités MS17-010 | 2017-05-12T00:00:00.000000 | 2017-06-27T00:00:00.000000 |
| CERTFR-2017-ALE-011 | Campagne de messages électroniques non sollicités de type Jaff | 2017-05-14T00:00:00.000000 | 2017-06-27T00:00:00.000000 |
| CERTFR-2017-ALE-010 | Propagation d'un rançongiciel exploitant les vulnérabilités MS17-010 | 2017-05-12T00:00:00.000000 | 2017-06-27T00:00:00.000000 |
| certfr-2017-ale-009 | Vulnérabilité dans Microsoft Malware Protection Engine | 2017-05-09T00:00:00.000000 | 2017-05-15T00:00:00.000000 |
| CERTFR-2017-ALE-009 | Vulnérabilité dans Microsoft Malware Protection Engine | 2017-05-09T00:00:00.000000 | 2017-05-15T00:00:00.000000 |
| certfr-2017-ale-005 | Vulnérabilité dans les commutateurs Cisco | 2017-03-20T00:00:00.000000 | 2017-05-10T00:00:00.000000 |
| certfr-2017-ale-004 | Vulnérabilité dans Apache Struts | 2017-03-10T00:00:00.000000 | 2017-05-10T00:00:00.000000 |
| CERTFR-2017-ALE-005 | Vulnérabilité dans les commutateurs Cisco | 2017-03-20T00:00:00.000000 | 2017-05-10T00:00:00.000000 |
| CERTFR-2017-ALE-004 | Vulnérabilité dans Apache Struts | 2017-03-10T00:00:00.000000 | 2017-05-10T00:00:00.000000 |
| certfr-2017-ale-007 | Vulnérabilité dans Microsoft Office | 2017-04-10T00:00:00.000000 | 2017-04-12T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0104 | Vulnérabilité dans Qnap QTS | 2026-01-30T00:00:00.000000 | 2026-01-30T00:00:00.000000 |
| certfr-2026-avi-0103 | Multiples vulnérabilités dans Node.js | 2026-01-30T00:00:00.000000 | 2026-01-30T00:00:00.000000 |
| certfr-2026-avi-0102 | Vulnérabilité dans Splunk Enterprise | 2026-01-30T00:00:00.000000 | 2026-01-30T00:00:00.000000 |
| CERTFR-2026-AVI-0110 | Multiples vulnérabilités Ivanti Endpoint Manager Mobile (EPMM) | 2026-01-30T00:00:00.000000 | 2026-01-30T00:00:00.000000 |
| CERTFR-2026-AVI-0109 | Multiples vulnérabilités dans les produits IBM | 2026-01-30T00:00:00.000000 | 2026-01-30T00:00:00.000000 |
| CERTFR-2026-AVI-0108 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-01-30T00:00:00.000000 | 2026-01-30T00:00:00.000000 |
| CERTFR-2026-AVI-0107 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-01-30T00:00:00.000000 | 2026-01-30T00:00:00.000000 |
| CERTFR-2026-AVI-0106 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-01-30T00:00:00.000000 | 2026-01-30T00:00:00.000000 |
| CERTFR-2026-AVI-0105 | Vulnérabilité dans Microsoft Edge | 2026-01-30T00:00:00.000000 | 2026-01-30T00:00:00.000000 |
| CERTFR-2026-AVI-0104 | Vulnérabilité dans Qnap QTS | 2026-01-30T00:00:00.000000 | 2026-01-30T00:00:00.000000 |
| CERTFR-2026-AVI-0103 | Multiples vulnérabilités dans Node.js | 2026-01-30T00:00:00.000000 | 2026-01-30T00:00:00.000000 |
| CERTFR-2026-AVI-0102 | Vulnérabilité dans Splunk Enterprise | 2026-01-30T00:00:00.000000 | 2026-01-30T00:00:00.000000 |
| certfr-2026-avi-0101 | Multiples vulnérabilités dans les produits Siemens | 2026-01-29T00:00:00.000000 | 2026-01-29T00:00:00.000000 |
| certfr-2026-avi-0100 | Multiples vulnérabilités dans les produits WithSecure | 2026-01-29T00:00:00.000000 | 2026-01-29T00:00:00.000000 |
| certfr-2026-avi-0099 | Multiples vulnérabilités dans SolarWinds Web Help Desk | 2026-01-28T00:00:00.000000 | 2026-01-29T00:00:00.000000 |
| CERTFR-2026-AVI-0101 | Multiples vulnérabilités dans les produits Siemens | 2026-01-29T00:00:00.000000 | 2026-01-29T00:00:00.000000 |
| CERTFR-2026-AVI-0100 | Multiples vulnérabilités dans les produits WithSecure | 2026-01-29T00:00:00.000000 | 2026-01-29T00:00:00.000000 |
| CERTFR-2026-AVI-0099 | Multiples vulnérabilités dans SolarWinds Web Help Desk | 2026-01-28T00:00:00.000000 | 2026-01-29T00:00:00.000000 |
| certfr-2026-avi-0098 | Vulnérabilité dans les produits Symfony | 2026-01-28T00:00:00.000000 | 2026-01-28T00:00:00.000000 |
| certfr-2026-avi-0097 | Vulnérabilité dans les produits Fortinet | 2026-01-28T00:00:00.000000 | 2026-01-28T00:00:00.000000 |
| certfr-2026-avi-0096 | Multiples vulnérabilités dans OpenSSL | 2026-01-28T00:00:00.000000 | 2026-01-28T00:00:00.000000 |
| certfr-2026-avi-0095 | Multiples vulnérabilités dans les produits Mozilla | 2026-01-28T00:00:00.000000 | 2026-01-28T00:00:00.000000 |
| certfr-2026-avi-0094 | Multiples vulnérabilités dans HPE Aruba Networking Fabric Composer | 2026-01-28T00:00:00.000000 | 2026-01-28T00:00:00.000000 |
| certfr-2026-avi-0093 | Multiples vulnérabilités dans Tenable Network Monitor | 2026-01-28T00:00:00.000000 | 2026-01-28T00:00:00.000000 |
| certfr-2026-avi-0092 | Vulnérabilité dans Google Chrome | 2026-01-28T00:00:00.000000 | 2026-01-28T00:00:00.000000 |
| certfr-2025-avi-0618 | Multiples vulnérabilités dans les produits Mitel | 2025-07-24T00:00:00.000000 | 2026-01-28T00:00:00.000000 |
| CERTFR-2026-AVI-0098 | Vulnérabilité dans les produits Symfony | 2026-01-28T00:00:00.000000 | 2026-01-28T00:00:00.000000 |
| CERTFR-2026-AVI-0097 | Vulnérabilité dans les produits Fortinet | 2026-01-28T00:00:00.000000 | 2026-01-28T00:00:00.000000 |
| CERTFR-2026-AVI-0096 | Multiples vulnérabilités dans OpenSSL | 2026-01-28T00:00:00.000000 | 2026-01-28T00:00:00.000000 |
| CERTFR-2026-AVI-0095 | Multiples vulnérabilités dans les produits Mozilla | 2026-01-28T00:00:00.000000 | 2026-01-28T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2024-003025 | Multiple vulnerabilities in ELECOM wireless LAN routers | 2024-03-27T14:26+09:00 | 2024-11-27T14:34+09:00 |
| jvndb-2024-012461 | Multiple vulnerabilities in SoftBank Mesh Wi-Fi router RP562B | 2024-11-13T14:26+09:00 | 2024-11-26T16:11+09:00 |
| jvndb-2024-000020 | Multiple vulnerabilities in ELECOM wireless LAN routers and wireless LAN repeater | 2024-02-20T14:14+09:00 | 2024-11-26T15:26+09:00 |
| jvndb-2024-000088 | Multiple vulnerabilities in ELECOM wireless LAN routers and access points | 2024-08-27T14:40+09:00 | 2024-11-26T15:17+09:00 |
| jvndb-2024-000121 | WordPress Plugin "WP Admin UI Customize" vulnerable to cross-site scripting | 2024-11-26T13:57+09:00 | 2024-11-26T13:57+09:00 |
| jvndb-2024-000106 | Multiple vulnerabilities in AIPHONE IX SYSTEM, IXG SYSTEM, and System Support Software | 2024-10-21T11:58+09:00 | 2024-11-21T11:37+09:00 |
| jvndb-2024-000120 | "Kura Sushi Official App Produced by EPARK" for Android uses a hard-coded cryptographic key | 2024-11-20T13:56+09:00 | 2024-11-20T13:56+09:00 |
| jvndb-2024-000119 | Multiple vulnerabilities in FitNesse | 2024-11-15T13:37+09:00 | 2024-11-20T11:18+09:00 |
| jvndb-2024-012941 | Multiple vulnerabilities in Rakuten Turbo 5G | 2024-11-19T10:41+09:00 | 2024-11-19T10:41+09:00 |
| jvndb-2024-000118 | WordPress Plugin "VK All in One Expansion Unit" vulnerable to cross-site scripting | 2024-11-13T13:50+09:00 | 2024-11-13T13:50+09:00 |
| jvndb-2024-009481 | Insecure initial password configuration issue in SEIKO EPSON Web Config | 2024-10-01T14:14+09:00 | 2024-11-12T10:25+09:00 |
| jvndb-2024-000109 | baserCMS plugin "BurgerEditor" vulnerable to directory listing | 2024-10-10T14:57+09:00 | 2024-11-06T14:45+09:00 |
| jvndb-2024-012017 | Trend Micro Deep Security 20 Agent for Windows vulnerable to improper access control | 2024-11-06T11:00+09:00 | 2024-11-06T11:00+09:00 |
| jvndb-2024-011833 | Incorrect authorization vulnerability in OMRON Sysmac Studio | 2024-11-05T15:29+09:00 | 2024-11-05T15:29+09:00 |
| jvndb-2024-011747 | Command injection vulnerability in Trend Micro Cloud Edge | 2024-11-01T14:28+09:00 | 2024-11-01T14:28+09:00 |
| jvndb-2024-011744 | REST-APIs unintentionally enabled in Century Systems FutureNet NXR series routers | 2024-11-01T13:49+09:00 | 2024-11-01T13:49+09:00 |
| jvndb-2024-000116 | Hikvision network camera security enhancement to prevent cleartext transmission of Dynamic DNS credentials | 2024-10-30T15:07+09:00 | 2024-10-30T15:07+09:00 |
| jvndb-2024-011256 | Multiple vulnerabilities in Sharp and Toshiba Tec MFPs | 2024-10-28T17:33+09:00 | 2024-10-28T17:33+09:00 |
| jvndb-2024-000115 | Chatwork Desktop Application (Windows) uses a potentially dangerous function | 2024-10-28T14:29+09:00 | 2024-10-28T14:29+09:00 |
| jvndb-2024-000112 | MUSASI version 3 performing authentication on client-side | 2024-10-18T14:40+09:00 | 2024-10-25T16:55+09:00 |
| jvndb-2024-000113 | N-LINE vulnerable to HTML injection | 2024-10-18T14:48+09:00 | 2024-10-25T16:48+09:00 |
| jvndb-2024-004623 | Multiple products from Check Point Software Technologies vulnerable to information disclosure | 2024-07-29T10:23+09:00 | 2024-10-24T16:37+09:00 |
| jvndb-2024-000111 | SHIRASAGI vulnerable to path traversal | 2024-10-16T14:12+09:00 | 2024-10-23T17:35+09:00 |
| jvndb-2024-010802 | Multiple SQL injection vulnerabilities in Trend Micro Deep Discovery Inspector | 2024-10-22T13:02+09:00 | 2024-10-22T13:02+09:00 |
| jvndb-2024-000102 | Multiple NTT EAST Home GateWay/Hikari Denwa routers fail to restrict access permissions | 2024-09-24T16:00+09:00 | 2024-10-18T11:02+09:00 |
| jvndb-2024-000110 | Multiple vulnerabilities in Exment | 2024-10-11T14:13+09:00 | 2024-10-11T14:13+09:00 |
| jvndb-2024-000104 | MF Teacher Performance Management System vulnerable to cross-site scripting | 2024-09-27T15:00+09:00 | 2024-10-10T11:14+09:00 |
| jvndb-2024-009667 | Multiple vulnerabilities in JTEKT ELECTRONICS Kostac PLC Programming Software | 2024-10-03T13:42+09:00 | 2024-10-03T13:42+09:00 |
| jvndb-2024-000108 | Apache Tomcat improper handling of TLS handshake process data | 2024-10-01T17:51+09:00 | 2024-10-01T17:51+09:00 |
| jvndb-2024-009498 | Vulnerability in Cosminexus | 2024-10-01T16:01+09:00 | 2024-10-01T16:01+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-11794 | Mozilla Thunderbird信息泄露漏洞(CNVD-2026-11794) | 2026-02-05 | 2026-02-28 |
| cnvd-2026-11793 | Advantech ADAM-5630跨站请求伪造漏洞 | 2024-09-29 | 2026-02-27 |
| cnvd-2026-11792 | Advantech ADAM-5630信息泄露漏洞 | 2024-09-29 | 2026-02-27 |
| cnvd-2026-11791 | Advantech ADAM-5630访问控制错误漏洞 | 2024-09-29 | 2026-02-27 |
| cnvd-2026-11790 | Advantech DeviceOn/iEdge跨站脚本漏洞 | 2025-11-10 | 2026-02-27 |
| cnvd-2026-11789 | Advantech DeviceOn/iEdge路径遍历漏洞(CNVD-2026-11789) | 2025-11-10 | 2026-02-27 |
| cnvd-2026-11788 | Advantech DeviceOn/iEdge路径遍历漏洞(CNVD-2026-11788) | 2025-11-10 | 2026-02-27 |
| cnvd-2026-11787 | Advantech DeviceOn/iEdge路径遍历漏洞 | 2025-11-11 | 2026-02-27 |
| cnvd-2026-11786 | Advantech TP-3250拒绝服务漏洞 | 2025-11-18 | 2026-02-27 |
| cnvd-2026-11785 | Advantech WebAccess/SCADA目录遍历漏洞 | 2025-12-24 | 2026-02-27 |
| cnvd-2026-11784 | Advantech WebAccess/SCADA SQL注入漏洞 | 2025-12-24 | 2026-02-27 |
| cnvd-2026-11783 | Advantech WebAccess/SCADA目录遍历漏洞(CNVD-2026-11783) | 2025-12-24 | 2026-02-27 |
| cnvd-2026-11782 | Advantech WebAccess/SCADA代码问题漏洞 | 2025-12-24 | 2026-02-27 |
| cnvd-2026-11781 | Advantech WebAccess/SCADA目录遍历漏洞(CNVD-2026-11781) | 2025-12-25 | 2026-02-27 |
| cnvd-2026-11780 | Huawei EMUI和Huawei HarmonyOS DFX模块越界写入漏洞 | 2026-02-11 | 2026-02-27 |
| cnvd-2026-11779 | Huawei EMUI和Huawei HarmonyOS文件系统模块越界写入漏洞 | 2026-02-11 | 2026-02-27 |
| cnvd-2026-11778 | Adobe DNG Software Development Kit (SDK)输入验证错误漏洞 | 2025-12-15 | 2026-02-26 |
| cnvd-2026-11777 | Adobe DNG Software Development Kit (SDK)拒绝服务漏洞 | 2025-12-15 | 2026-02-26 |
| cnvd-2026-11776 | Adobe DNG Software Development Kit (SDK)堆缓冲区溢出漏洞 | 2025-12-15 | 2026-02-26 |
| cnvd-2026-11775 | Adobe DNG Software Development Kit (SDK)越界读取漏洞 | 2025-12-15 | 2026-02-26 |
| cnvd-2026-11774 | Adobe Dreamweaver Desktop输入验证错误漏洞(CNVD-2026-11774) | 2026-01-16 | 2026-02-26 |
| cnvd-2026-11773 | Adobe InDesign缓冲区溢出漏洞(CNVD-2026-11773) | 2026-01-19 | 2026-02-26 |
| cnvd-2026-11772 | Adobe InDesign缓冲区溢出漏洞(CNVD-2026-11772) | 2026-01-19 | 2026-02-26 |
| cnvd-2026-11771 | Adobe Dreamweaver授权问题漏洞 | 2026-01-19 | 2026-02-26 |
| cnvd-2026-11770 | Adobe InDesign堆缓冲区溢出漏洞(CNVD-2026-11770) | 2026-01-19 | 2026-02-26 |
| cnvd-2026-11769 | Adobe Substance 3D Modeler空指针取消引用漏洞 | 2026-01-19 | 2026-02-26 |
| cnvd-2026-11768 | Adobe Substance 3D Modeler空指针取消引用漏洞(CNVD-2026-11768) | 2026-01-19 | 2026-02-26 |
| cnvd-2026-11767 | Adobe InDesign越界读取漏洞(CNVD-2026-11767) | 2026-01-19 | 2026-02-26 |
| cnvd-2026-11766 | Wondershare Driver Install Service代码问题漏洞 | 2026-02-05 | 2026-02-26 |
| cnvd-2026-11765 | Huawei HarmonyOS相机模块越界写入漏洞 | 2026-02-11 | 2026-02-26 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2025-14098 | Уязвимость функции hdr_first_de() компонента ntfs3 ядра операционной системы Linux, позво… | 14.11.2025 | 16.02.2026 |
| bdu:2025-14095 | Уязвимость функции cm_chan_msg_send() модуля drivers/rapidio/rio_cm.c ядра операционной с… | 14.11.2025 | 16.02.2026 |
| bdu:2025-14090 | Уязвимость функции vsock_find_cid() ядра операционной системы Linux, позволяющая нарушите… | 14.11.2025 | 16.02.2026 |
| bdu:2025-13924 | Уязвимость библиотеки LibTIFF, связанная с выходом операции за границы буфера в памяти, п… | 10.11.2025 | 16.02.2026 |
| bdu:2025-13921 | Уязвимость библиотеки LibTIFF, связанная с выходом операции за границы буфера в памяти, п… | 10.11.2025 | 16.02.2026 |
| bdu:2025-13888 | Уязвимость функции ax25_kiss_rcv() модуля ax25_kiss_rcv ядра операционной системы Linux, … | 07.11.2025 | 16.02.2026 |
| bdu:2025-13881 | Уязвимость функции SSID в __cfg80211_connect_result() модуля net/wireless/sme.c ядра опер… | 07.11.2025 | 16.02.2026 |
| bdu:2025-13880 | Уязвимость функции pad_compress_skb() модуля drivers/net/ppp/ppp_generic.c ядра операцион… | 07.11.2025 | 16.02.2026 |
| bdu:2025-13687 | Уязвимость функции __mark_inode_dirty() ядра операционной системы Linux, позволяющая нару… | 05.11.2025 | 16.02.2026 |
| bdu:2025-13684 | Уязвимость функции cmp_bss() ядра операционной системы Linux, позволяющая нарушителю вызв… | 05.11.2025 | 16.02.2026 |
| bdu:2025-13682 | Уязвимость функции l2cap_sock_cleanup_listen() ядра операционной системы Linux, позволяющ… | 05.11.2025 | 16.02.2026 |
| bdu:2025-13679 | Уязвимость функции list_first_entry() ядра операционной системы Linux, позволяющая наруши… | 05.11.2025 | 16.02.2026 |
| bdu:2025-13565 | Уязвимость функции cache_set_flush() ядра операционной системы Linux, позволяющая нарушит… | 29.10.2025 | 16.02.2026 |
| bdu:2025-13564 | Уязвимость функции automount_fullpath() ядра операционной системы Linux, позволяющая нару… | 29.10.2025 | 16.02.2026 |
| bdu:2025-13563 | Уязвимость функции do_register_framebuffer() ядра операционной системы Linux, позволяющая… | 29.10.2025 | 16.02.2026 |
| bdu:2025-13522 | Уязвимость функции hid_hw_raw_request() драйвера Low Level Transport ядра операционной си… | 28.10.2025 | 16.02.2026 |
| bdu:2025-13520 | Уязвимость функции __mptcp_do_fallback() компонента mptcp ядра операционной системы Linux… | 28.10.2025 | 16.02.2026 |
| bdu:2025-13517 | Уязвимость драйвера Low Level Transport ядра операционной системы Linux, позволяющая нару… | 28.10.2025 | 16.02.2026 |
| bdu:2025-13514 | Уязвимость функции misc_deregister() компонента soc ядра операционной системы Linux, позв… | 28.10.2025 | 16.02.2026 |
| bdu:2025-13513 | Уязвимость функции fxls8962af_fifo_flush() компонента iio ядра операционной системы Linux… | 28.10.2025 | 16.02.2026 |
| bdu:2025-13512 | Уязвимость функции rose_rt_device_down() ядра операционной системы Linux, позволяющая нар… | 28.10.2025 | 16.02.2026 |
| bdu:2025-13511 | Уязвимость функции rpl_do_srh_inline() компонента rpl ядра операционной системы Linux, по… | 28.10.2025 | 16.02.2026 |
| bdu:2025-13498 | Уязвимость функции __kmem_cache_shutdown ядра операционной системы Linux, позволяющая нар… | 28.10.2025 | 16.02.2026 |
| bdu:2025-13494 | Уязвимость компонента ath6kl ядра операционной системы Linux, позволяющая нарушителю вызв… | 28.10.2025 | 16.02.2026 |
| bdu:2025-13493 | Уязвимость функции msdc_prepare_data() компонента mtk-sd ядра операционной системы Linux,… | 28.10.2025 | 16.02.2026 |
| bdu:2025-13486 | Уязвимость функции dbMount операционной системы Linux, позволяющая нарушителю оказать воз… | 28.10.2025 | 16.02.2026 |
| bdu:2025-13485 | Уязвимость компонента media операционной системы Linux, позволяющая нарушителю вызвать от… | 28.10.2025 | 16.02.2026 |
| bdu:2025-13484 | Уязвимость функции v4l2_rect_map_inside операционной системы Linux, позволяющая нарушител… | 28.10.2025 | 16.02.2026 |
| bdu:2025-13482 | Уязвимость ядра операционной системы Linux, связанная с недостаточной проверкой входных д… | 28.10.2025 | 16.02.2026 |
| bdu:2025-13479 | Уязвимость операционной системы Linux, связанная с ошибкой разыменования указателей, позв… | 28.10.2025 | 16.02.2026 |
| ID | Description | Updated |
|---|---|---|
| var-200106-0170 | Buffer overflow in ntpd ntp daemon 4.0.99k and earlier (aka xntpd and xntp3) allows remot… | 2024-07-23T21:52:30.595000Z |
| var-201403-0508 | The sctp_sf_do_5_1D_ce function in net/sctp/sm_statefuns.c in the Linux kernel through 3.… | 2024-07-23T21:52:28.560000Z |
| var-202205-1319 | A use after free issue was addressed with improved memory management. This issue is fixed… | 2024-07-23T21:52:24.897000Z |
| var-201804-1186 | An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari be… | 2024-07-23T21:52:24.271000Z |
| var-201102-0095 | Google Chrome before 9.0.597.94 does not properly perform event handling for animations, … | 2024-07-23T21:52:24.603000Z |
| var-200107-0019 | Cisco routers and switches running IOS 12.0 through 12.2.1 allows a remote attacker to ca… | 2024-07-23T21:51:49.898000Z |
| var-202002-1480 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:51:05.518000Z |
| var-201503-0389 | The build_tablename function in pgsql.c in the PostgreSQL (aka pgsql) extension in PHP th… | 2024-07-23T21:51:05.137000Z |
| var-202109-1805 | Malformed requests may cause the server to dereference a NULL pointer. This issue affects… | 2024-07-23T21:51:04.963000Z |
| var-201803-0086 | LibTIFF 4.0.3 allows remote attackers to cause a denial of service (out-of-bounds write) … | 2024-07-23T21:51:04.545000Z |
| var-202206-1186 | Incomplete cleanup of microarchitectural fill buffers on some Intel(R) Processors may all… | 2024-07-23T21:51:00.840000Z |
| var-201912-1853 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:50:27.591000Z |
| var-201912-0123 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:50:27.004000Z |
| var-201904-0756 | A memory corruption issue was addressed with improved memory handling. This issue affecte… | 2024-07-23T21:50:26.406000Z |
| var-200907-0717 | WebKit in Apple Safari before 4.0.2, as used on iPhone OS before 3.1, iPhone OS before 3.… | 2024-07-23T21:50:25.062000Z |
| var-202205-1304 | A use after free issue was addressed with improved memory management. This issue is fixed… | 2024-07-23T21:50:24.904000Z |
| var-200810-0142 | The Postfix configuration file in Mac OS X 10.5.5 causes Postfix to be network-accessible… | 2024-07-23T21:50:24.464000Z |
| var-201107-0125 | The Curl_input_negotiate function in http_negotiate.c in libcurl 7.10.6 through 7.21.6, a… | 2024-07-23T21:50:23.993000Z |
| var-202006-1651 | A logic issue was addressed with improved restrictions. This issue is fixed in iOS 13.5 a… | 2024-07-23T21:50:22.831000Z |
| var-200809-0008 | Finder in Apple Mac OS X 10.5 through 10.5.4 does not properly update permission data in … | 2024-07-23T21:50:10.607000Z |
| var-201203-0191 | Use-after-free vulnerability in Google Chrome before 17.0.963.65 allows remote attackers … | 2024-07-23T21:50:08.937000Z |
| var-201206-0064 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T21:49:37.613000Z |
| var-202004-2202 | A memory corruption issue was addressed with improved memory handling. This issue is fixe… | 2024-07-23T21:49:25.052000Z |
| var-202207-1485 | An out-of-bounds write issue was addressed with improved input validation. This issue is … | 2024-07-23T21:49:20.877000Z |
| var-201007-0321 | Use-after-free vulnerability in WebKit in Apple Safari before 5.0.1 on Mac OS X 10.5 thro… | 2024-07-23T21:49:20.293000Z |
| var-201803-0099 | The _TIFFmalloc function in tif_unix.c in LibTIFF 4.0.3 does not reject a zero size, whic… | 2024-07-23T21:49:16.122000Z |
| var-200505-0359 | Apple Terminal 1.4.4 allows attackers to execute arbitrary commands via terminal escape s… | 2024-07-23T21:49:11.998000Z |
| var-202003-1782 | FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between seriali… | 2024-07-23T21:48:40.941000Z |
| var-201806-1486 | An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari be… | 2024-07-23T21:48:39.044000Z |
| var-200705-0670 | The png_handle_tRNS function in pngrutil.c in libpng before 1.0.25 and 1.2.x before 1.2.1… | 2024-07-23T21:48:39.239000Z |